-
Notifications
You must be signed in to change notification settings - Fork 2.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Requesting support for hash mode to support FT PSK additional to 22000 mode #3887
Comments
The formulas to recover the PSK: get PMK-R0:
get PMK-R1:
An example (containing all calculated session keys)
We need to add three additional fields to a FT-PSK hash line:
A PMKID hash line could look like this:
An EAPOL hash line could look like this:
BTW: |
RxKH-ID field can be up to 48 bytes: |
Calculation of the MIC is similar to WPA2 key version 3 (AES-128-CMAC) More information is here: |
In certain situations dumptools are forced only to capture handshakes with FT using PSK (802.11r). Theres no hash mode to convert these captures. So requesting to add hash mode supporting this.
A txt file explaining this attached. (Explained by a known hash dev)
message (1).txt
The text was updated successfully, but these errors were encountered: