This is our old Q&A Site. Please post any new questions and answers at ask.wireshark.org.

Captured handshake and password have been found using brut forcing tools of kali Linux now i interested in how its work so i did following steps:

  • Generated PMK form PSK and SSID using online calculator
  • Generated PTK using online calculator HMAC-SHA-1 from following input
  • Data = Min_MAC Address, MAX_MAC Address, Min_Nonce, Max_Nonce.
  • key = PMK
  • from which i get 384 bit PTK
  • this PTK divided in three parts (KCK, KEK, TK)
  • KCK encrypt with KEK by using AES-128 using online calculator where data
  • data = KCK
  • key = KEK
  • That KCK should be matched with the MIC, i founded using kali Linux tools (the MIC of second packet of handshake) which is not the same

Now the question is! What I missed here please help me I m so tired

asked 28 Jul '17, 03:59

Aziz88's gravatar image

Aziz88
6112
accept rate: 0%

edited 28 Jul '17, 04:18

sindy's gravatar image

sindy
6.0k4851

Be the first one to answer this question!
toggle preview

Follow this question

By Email:

Once you sign in you will be able to subscribe for any updates here

By RSS:

Answers

Answers and Comments

Markdown Basics

  • *italic* or _italic_
  • **bold** or __bold__
  • link:[text](http://url.com/ "title")
  • image?![alt text](/path/img.jpg "title")
  • numbered list: 1. Foo 2. Bar
  • to add a line break simply add two spaces to where you would like the new line to be.
  • basic HTML tags are also supported

Question tags:

×44
×1
×1
×1

question asked: 28 Jul '17, 03:59

question was seen: 817 times

last updated: 28 Jul '17, 04:18

p​o​w​e​r​e​d by O​S​Q​A