Skip to content

eda-abec/wpa_pmkid_crack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

26 Commits
 
 
 
 

Repository files navigation

wpa_pmkid_crack

Python implementation of the attack discovered by @jsteube, described at https://hashcat.net/forum/thread-7717.html

It calls wpa_passphrase to generate a conf file and a wpa_supplicant to obtain the PMKID hash

Features

  • generates a hash file, which can be passed to hashcat (-m 16800)
  • timeout option
  • Termux compatible (root required, but not monitor mode)
  • more to come :)

Example usage

sudo python3 ./pmkid_crack.py -i wlan0 -e w1f1 -b 00:00:0A:BB:28:FC

Bottom line

Tested on Python 3.8.2, should work with any 3.*

Thanks to @glezo1 for original script

About

Python implementation of the attack discovered by @jsteube

Topics

Resources

Stars

Watchers

Forks

Languages

  • Python 100.0%