Skip to content

eda-abec/wpa_pmkid_crack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 

Repository files navigation

wpa_pmkid_crack

python implementation of the attack discovered by @jsteube , described at https://hashcat.net/forum/thread-7717.html

It just calls wpa_passphrase to generate a conf file

,wpa_supplicant to force the generation of the pmkid hash

,generates the 16800-format hash

,and should call hashcat to crack the hash.

Tested on python 3.5, should be ok with any 3.*

About

Python implementation of the attack discovered by @jsteube

Topics

Resources

Stars

Watchers

Forks

Languages

  • Python 100.0%