Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: PMKID cracked but which AP?
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
So I captured 22 PMKIDs, exported with hcxtpcapool, cracked one of the PMKIDs but the result shows what looks like a hash string and then the plaintext password.


Results below:

 "9d155eb5bfe7f2371840c702e21f7a6e7af2d60d5c2c0b4fbace2ed71cf62fa9:amazinf"

How do i find the AP it belongs to?
As you can see here https://hashcat.net/wiki/doku.php?id=example_hashes the hash format is designed in a way that it has the MAC addresses etc in it to easily recognize the network.

Which versions of hashcat/hcxtools do you use ?
Thanks for the fast reply Phil. I'm using Hashcat 5.1.0 and ZerBea's most recent release of hcxtools.
My Hashcat output did not come separated by an asterisk like the examples on the link. Would the last twelve characters of the hash string be the AP's MAC?
try https://hashcat.net/beta/ . a lot of things changed already since last release of latest hashcat version