Python implementation of the attack discovered by @jsteube, described at https://hashcat.net/forum/thread-7717.html
It calls wpa_passphrase to generate a conf file and a wpa_supplicant to obtain the PMKID hash
- generates a hash file, which can be passed to hashcat (
-m 16800
) - timeout option
- Termux compatible (root required, but not monitor mode)
- more to come :)
sudo python3 ./pmkid_crack.py -i wlan0 -e w1f1 -b 00:00:0A:BB:28:FC
Tested on Python 3.8.2, should work with any 3.*
Thanks to @glezo1 for original script