Skip to content

Generates plainmasterkeys (PMK) from essid and password

License

Notifications You must be signed in to change notification settings

RomelSan/WPA-PMK-Generator

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

WPA PMK Generator

Description

Generates plainmasterkeys from essid and password for use with hashcat hash-mode 2501
Also can output to Hashcat and John format to use with mode 12000 - PBKDF2-HMAC-SHA1
WPA / WPA2 / WPA3 PMK

Checklist

  • Generates WPA PMK
  • Can be used in hashcat mode 2501
  • Exports to Hashcat mode 12000 and John pbkdf2-hmac-sha1 via wlanwkp2hcx

Technologies:

Visual Studio 15.8
Net Framework 4.6.1
Cygwin v2.893

Algorithm

PMK = PBKDF2(HMAC−SHA1, PSK, SSID, 4096, 256)

The PMK is a SHA1 hashing function with HMAC as the message authentication code.
The PMK is generated from 4096 iterations of the hashing method and creates a 256-bit PMK
which is 64 hexadecimal characters and where each hexadecimal character represents 4 bits.

RFC2898

Hashcat Usage Example:

Generated Data with WPA PMK Generator

SSID: linkedin
Password: 12345
PMK: 1C82477156E66458585008F845155866F1DA534EC8AEB45A9300A38111B47A00
sha1:4096:bGlua2VkaW4=:HIJHcVbmZFhYUAj4RRVYZvHaU07IrrRakwCjgRG0egA=

Brute force all passwords length 1-8 with possible characters 0-9 (Numbers)

hashcat64.exe -a 3 --increment -m 12000 sha1:4096:bGlua2VkaW4=:HIJHcVbmZFhYUAj4RRVYZvHaU07IrrRakwCjgRG0egA= ?d?d?d?d?d?d?d?d

License

MIT License