12-07-2018, 05:26 PM
Hello!
I'm running into another issue/question about what I need to crack.
I have collected several WPA handshakes, PMKIDs and NetNTLMv2 challenge/response pairs.
Many of these are duplicates for the same user and/or SSID
For example, I have 9 unique PMKID for a single SSID.
If cracked, those 9 PMKID should all result in the same password. (And I've tested this on a simple password to confirm)
The more PMKIDs I sent to hashcat, the slower it goes. Is there any reason I'd WANT to send every unique, but duplicate, PMKID I collect to hashcat?
I'm running into another issue/question about what I need to crack.
I have collected several WPA handshakes, PMKIDs and NetNTLMv2 challenge/response pairs.
Many of these are duplicates for the same user and/or SSID
For example, I have 9 unique PMKID for a single SSID.
If cracked, those 9 PMKID should all result in the same password. (And I've tested this on a simple password to confirm)
The more PMKIDs I sent to hashcat, the slower it goes. Is there any reason I'd WANT to send every unique, but duplicate, PMKID I collect to hashcat?