Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

wpa passwordlength should be limited to 63 (hashcat -m 2500) #1286

Closed
ZerBea opened this issue Jul 3, 2017 · 0 comments
Closed

wpa passwordlength should be limited to 63 (hashcat -m 2500) #1286

ZerBea opened this issue Jul 3, 2017 · 0 comments

Comments

@ZerBea
Copy link
Contributor

ZerBea commented Jul 3, 2017

In hashcat mode -m 2600 (wpa/wpa2) passwordlength should be limited to 63 characters.
According to the 802.11i specification:
A pass-phrase is a sequence of between 8 and 63 ASCII-encoded characters. The limit of 63 comes from the desire to distinguish between a pass-phrase and a PSK displayed as 64 hexadecimal characters.
64 hexadecimal characters are only allowed for PSK

Cheers
ZerBea

@jsteube jsteube closed this as completed in fc100a8 Jul 3, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant