#!/usr/bin/env perl ## ## Author......: See docs/credits.txt ## License.....: MIT ## use strict; use warnings; use Crypt::PBKDF2; use Digest::SHA qw (sha1); use Digest::HMAC qw (hmac_hex); sub module_constraints { [[8, 63], [-1, -1], [-1, -1], [-1, -1], [-1, -1]] } sub module_generate_hash { my $word = shift; my $salt = shift; my $macap = shift; my $macsta = shift; my $essid = shift; if (!defined ($macap)) { $macap = unpack ("H*", random_bytes (6)); } if (!defined ($macsta)) { $macsta = unpack ("H*", random_bytes (6)); } if (!defined ($essid)) { $essid = unpack ("H*", random_bytes (random_number (0, 32) & 0x1e)); } my $pbkdf2 = Crypt::PBKDF2->new ( hash_class => 'HMACSHA1', iterations => 4096, output_len => 32, ); my $essid_bin = pack ("H*", $essid); my $pmk = $pbkdf2->PBKDF2 ($essid_bin, $word); my $macap_bin = pack ("H*", $macap); my $macsta_bin = pack ("H*", $macsta); my $data = "PMK Name" . $macap_bin . $macsta_bin; my $pmkid = hmac_hex ($data, $pmk, \&sha1); my $hash = sprintf ("%s:%s:%s:%s", substr ($pmkid, 0, 32), $macap, $macsta, $essid); return $hash; } sub module_verify_hash { print "ERROR: verify currently not supported for WPA-PMKID-PBKDF2 (because of hashcat's output format)\n"; exit (1); } 1;