

16 bytes of Temporal Key (TK) – Used to encrypt/decrypt Unicast data packets.16 bytes of EAPOL-Key Encryption Key (KEK) – AP uses this key to encrypt additional data sent (in the ‘Key Data’ field) to the client (for example, the RSN IE or the GTK).16 bytes of EAPOL-Key Confirmation Key (KCK)– Used to compute MIC on WPA EAPOL Key message.The STA sends a confirmation to the AP.Īll the above messages are sent as EAPOL -Key frames.Īs soon as the PTK is obtained it is divided into five separate keys:.This sequence number will be used in the next multicast or broadcast frame, so that the receiving STA can perform basic replay detection.


The STA sends its own nonce-value (SNonce) to the AP together with a MIC, including authentication, which is really a Message Authentication and Integrity Code: (MAIC).The client now has all the attributes to construct the PTK. The AP sends a nonce-value to the STA (ANonce).The actual messages exchanged during the handshake are depicted in the figure and explained below: The handshake also yields the GTK (Group Temporal Key), used to decrypt multicast and broadcast traffic. The product is then put through PBKDF2 -SHA1 as the cryptographic hash function.
#SELF GENERATED WORDLIST FOR HACKING WIFI MAC#
The PTK is generated by concatenating the following attributes: PMK, AP nonce (ANonce), STA nonce (SNonce), AP MAC address, and STA MAC address. Therefore the four-way handshake is used to establish another key called the PTK (Pairwise Transient Key). This key is, however, designed to last the entire session and should be exposed as little as possible. The earlier EAP exchange or WPA2-PSK has provided the shared secret key PMK (Pairwise Master Key). The authentication process leaves two considerations: the access point (AP) still needs to authenticate itself to the client station (STA), and keys to encrypt the traffic need to be derived. Also, before that, some optional wikipedia theory on what a 4-way handshake really is (you don’t want to become a script kiddie do you?) We will also see what problems one can face during the process (I’ll face the problems for you). But since WPA is a long shot, we shall first look at the process of capturing a handshake. Now there are various different ways cracking of WPA can be done. WPA hacking (and hash cracking in general) is pretty resource intensive and time taking process. If the process sounds really time consuming to you, then its because it is.

#SELF GENERATED WORDLIST FOR HACKING WIFI PASSWORD#
Now if the hashes match, we know what plain text password gave rise to the hash, thus we know the password. Then we’ll match the hash we created with the one that’s there in the handshake. We can take all possible passwords that can exists, and convert them to hash. Now there’s no direct way of getting the password out of the hash, and thus hashing is a robust protection method. This handshake has the hash of the password. What happens is when the client and access point communicate in order to authenticate the client, they have a 4 way handshake that we can capture. What you need is you, the attacker, a client who’ll connect to the wireless network, and the wireless access point.
