Results 1 to 2 of 2

Thread: a question about wpa password hashes

  1. #1
    Just burned his ISO
    Join Date
    Nov 2011

    Default a question about wpa password hashes

    pardon me if this is a frustratingly noob question, I don't have a very in depth knowledge of cryptography.

    when you get the hash from a wpa handshake you get a piece of data in the format 00:00:00:00:00:00, with each of the zeros representing a hex value. you can then use this information to do an offline bruteforce or smart attack against the essid. my math tells me that there are only 281,474,976,710,656 possible hashes a handshake can produce, but there are 95^63 possible pass phrases for wpa. does that mean that there are multiple pass phrases that can be used on any wpa-psk? i imagine the answer to that question is no, but if somebody could tell me why they would be doing me a big favour.

  2. #2
    Good friend of the forums scottm99's Avatar
    Join Date
    Feb 2010

    Default Re: a question about wpa password hashes

    If you're using pre-shared key, then only 1 passphrase can be used at a time (the same one has to be entered on all devices connecting to the LAN). Since a passphrase can be anything, I would assume there would be an infinite number of possible passphrases. To quote the wikipedia entry on passphrases "This key may be entered either as a string of 64 hexadecimal digits, or as a passphrase of 8 to 63 printable ASCII characters. If ASCII characters are used, the 256 bit key is calculated by applying the PBKDF2 key derivation function to the passphrase, using the SSID as the salt and 4096 iterations of HMAC-SHA1." I'd suggest looking at the wikipedia entry for WPA for more info.
    If I could figure out how to scuba dive & hack at the same time, there would be nothing I couldn't do...

Similar Threads

  1. question about cracking NTLM hashes
    By mia_tech in forum Beginners Forum
    Replies: 1
    Last Post: 09-13-2010, 09:15 PM
  2. Password Wordlist question
    By inet10 in forum Beginners Forum
    Replies: 5
    Last Post: 06-09-2010, 06:29 AM
  3. extracting password hashes from NTDS.DIT on MS DC?
    By imported_John_smith in forum OLD Pentesting
    Replies: 1
    Last Post: 02-05-2010, 10:00 AM
  4. john password question
    By BigMac in forum OLD Newbie Area
    Replies: 1
    Last Post: 02-20-2008, 10:41 PM
  5. Capture Password Hashes from Patched Windows Machines
    By Ferdinandthebull in forum OLD Tutorials and Guides
    Replies: 1
    Last Post: 01-08-2008, 08:12 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts