Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 17 Sep 2013 18:55:05 +0200
From: magnum <john.magnum@...hmail.com>
To: john-users@...ts.openwall.com
Subject: Re: question about converting a WPA-PSK password from hex to ASCII

On 17 sep 2013, at 11:52, JohnyKrekan <krekan@...nykrekan.com> wrote:
> Hello, I would like to ask whether someone has any utility which can calculate a text passphrase which was used to protect a WPA-PSK network, when I know the 64 hex numbers which represents the password and the ESSID of the network?
> I have found only
> http://jorisvr.nl/wpapsk.html
> But i would like to be able do exactly same but in reversed order (from hex to passphrase).

The whole point with password hashes is the fact that it is mathematically impossible (and proven so) to reverse the formula. Your only chance is to try passwords systematically, run them through the formula and see if it produces your target hash. If it does not, try next password. This is what JtR and other password crackers do, in an optimized fashion. For a computationally expensive hash like WPA-PSK this is not feasible unless the password is very weak - ie. a common word or a short number.

magnum

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.