Skip to content

glezo1/wpa_pmkid_crack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 

Repository files navigation

wpa_pmkid_crack

python implementation of the attack discovered by @jsteube , described at https://hashcat.net/forum/thread-7717.html

It just calls wpa_passphrase to generate a conf file

,wpa_supplicant to force the generation of the pmkid hash

,generates the 16800-format hash

,and should call hashcat to crack the hash.

Tested on python 3.5, should be ok with any 3.*

About

python implementation of the attack discovered by @jsteube

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages