Extract PMK from 4 way handshake?
I'm new to this forum, but I search it for the answer to my question and I didn't find it.
So: is there a way (or is it possible) to extract the PMK (for use it in wpa_supplicant) after I capture a four way handshake? From the resultant *.cap file from airodump-ng.
IF I can have the PMK, I can clone my wireless MAC with the client that I send the deauth packets and try to connect to the WPA AP without trying to crack the password with a wordlist.
It's too simple to be true, but I give it a try
No chance at all of that working
Originally Posted by madics