N
N
neuroepoc2018-03-12 01:10:59
Python
neuroepoc, 2018-03-12 01:10:59

How to get PMK from bssid of access point and password on your knee?

There is a BSSID and a password (let's say 12345678) you need to get a PMK from them.
from what I found, little sense:

PMK in WPA2
WPA2-Personal mode generates a 256-bit key, sometimes referred to as a PreShared Key (PSK), from the passphrase entered in plain text. After that, the PMK mathematical basis is generated from the PSK key, the SSID indicator (Service Set Identifier) ​​and its length.

It all starts with the "short password" (from the user) being converted into a longer key with the addition of the name of the wireless network - PBKDF is used for this, which can be equated to computing a hash over SHA-1 4096 times in a row. As a result, we get 256- bit string, i.e. 32 bytes. Note that it is unique for different networks with the same passwords if they have different names.

Pyrit has a batch command, which I wanted to deal with in python. If I understand correctly, then this command calculates the PMK from ssid + password, a database is created, which is then checked against handshake.
I found blocks on the pyrit github that mention sha and the number 4096, but I couldn’t figure it out.
Please, explain by what rules how the value is created {in pyrit}, which is then compared with the value obtained from HANDSHAKE.
Experience is expected:
1) generating a value (pmk) from Bssid ("d-link") and password ("12345678")
2) intercepting the handshake and comparing the value from the handshake with the generated value
3) confirming their equivalence

Answer the question

In order to leave comments, you need to log in

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question