


However, this new technique eliminates the need of an EAPOL 4-way handshake, and is instead done on the Robust Security Network Information Element (RSN IE) of a single EAPOL frame, Steube said in his post.

The new technique was discovered by Jens Steube, the developer of widely-known password cracking tool Hashcat.īefore this method was discovered, typical WPA/WPA2 cracking methods relied on waiting for a user to login to the wireless network, before capturing the full authentication handshake process and conducting a brute-force search for the password. A new strategy has been found that easily obtains the Pairwise Master Key Identifier (PMKID) from a WPA/WPA2-secured router, which can be used to quickly crack the router’s wireless password.
