PMKID Hash Capture
Last updated
Last updated
The PMKID attack is a method used to crack WPA/WPA2-PSK Wi-Fi passwords. It targets the Pairwise Master Key Identifier (PMKID) exchange process in the 4-way handshake of the WPA/WPA2 authentication process. By capturing a PMKID hash and using a brute-force or dictionary attack, an attacker can attempt to recover the Wi-Fi password. This attack takes advantage of a weakness in the WPA/WPA2 protocol and the use of weak or easily guessable passwords. It is important to note that performing this attack without proper authorization is illegal and unethical. It is crucial to ensure the security of Wi-Fi networks by using strong passwords and implementing additional security measures.
installing Tools
you should install two tools: hcxdumptool , hcxpcapngtool
Just Follow Steps in the GitHub Repository to download them
Stop all services accessing the WIFI Network
Capturing WIFI Network
Now, let this command run for some time to capture the required information
Start WIFI Network services again
You can crack the pcapng file "dumpfile.pcapng" using a wordlist (like in the previous test) or using Hashcat:
Hashcat CrackingYou can check those YouTube Videos/Tutorials about PMKID Hash Capture:
This YouTube Video created by David Bombal
This YouTube Video created by Null Byte