Results 1 to 2 of 2

Thread: Extract PMK from 4 way handshake?

  1. #1
    Just burned his ISO
    Join Date
    Apr 2008
    Posts
    3

    Default Extract PMK from 4 way handshake?

    Hello
    I'm new to this forum, but I search it for the answer to my question and I didn't find it.
    So: is there a way (or is it possible) to extract the PMK (for use it in wpa_supplicant) after I capture a four way handshake? From the resultant *.cap file from airodump-ng.
    IF I can have the PMK, I can clone my wireless MAC with the client that I send the deauth packets and try to connect to the WPA AP without trying to crack the password with a wordlist.
    It's too simple to be true, but I give it a try
    Thanks.

  2. #2
    Developer balding_parrot's Avatar
    Join Date
    May 2007
    Posts
    3,399

    Default

    Quote Originally Posted by madics View Post
    Hello
    I'm new to this forum, but I search it for the answer to my question and I didn't find it.
    So: is there a way (or is it possible) to extract the PMK (for use it in wpa_supplicant) after I capture a four way handshake? From the resultant *.cap file from airodump-ng.
    IF I can have the PMK, I can clone my wireless MAC with the client that I send the deauth packets and try to connect to the WPA AP without trying to crack the password with a wordlist.
    It's too simple to be true, but I give it a try
    Thanks.
    No chance at all of that working

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •