I have looked at the pre-hashed tables produced by offensive-security and they have one called eduroam.wpa. If I wish to generate my own table for some ESSID, I assue I have to use genpmk from the cowpatty package. Could someone clarify if the the .wpa tables produced by offensive-security were actually generated with genpmk?

I tried to create my own eduroam.wpa table based on the 49m wordlist from offensive-security. The confusion I have is that if I cancel the process and start it at a later date, the program as expected informs me it will append file, however it starts to count from start again which seems illogical. Can someone shed some light on this please?

example:


e.g.
# genpmk -f /root/wpalist.txt -d /mnt/1/eduroam.wpa -s eduroam
genpmk 1.0 - WPA-PSK precomputation attack. <jwright@hasborg.com>
File /mnt/s/dll/eduroam.wpa.moi does not exist, creating.
key no. 1000: AANGEERFDE
key no. 2000: AANHUPPELEN
key no. 3000: AANSTIKT
key no. 4000: AASTORREN
key no. 5000: ABC123Cougar
key no. 6000: ABC123franklin
key no. 7000: ABC123visa

^C <-- killed session here
13220 passphrases tested in 243.04 seconds: 54.39 passphrases/second
13221
# genpmk -f /root/wpalist.txt -d /mnt/1/eduroam.wpa -s eduroam
genpmk 1.0 - WPA-PSK precomputation attack. <jwright@hasborg.com>
File /mnt/1/eduroam.wpa exists, appending new data.

key no. 1000: AANGEERFDE
key no. 2000: AANHUPPELEN
key no. 3000: AANSTIKT
key no. 4000: AASTORREN
key no. 5000: ABC123Cougar
...

Sure enought the file gets appended as the byte count increases from where it left off in the previous session, however as you can see the visual indicator is confusing.

TIA