Skip to content

Professor606/WPA2-EAPOL-Hash-Generator

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 

Repository files navigation

WPA2 EAPOL Hash Generator (Synthetic)

A Python tool to generate synthetic WPA2 EAPOL (4-Way Handshake) hashes in hc22000 format (Hashcat mode 22000).

This tool allows you to create valid test hashes for password cracking research or Hashcat benchmarking without needing to capture a real handshake from the air.

Features

  • Generates valid WPA2 PMK, PTK, KCK, and MIC.
  • Constructs a raw EAPOL frame (Message 2 of 4).
  • Outputs a ready-to-crack hash line in Hashcat hc22000 (Type 02) format.
  • Interactive mode to specify SSID, MAC addresses, and known Password.
  • Creates a pass.txt wordlist for immediate testing.

Installation

No external dependencies are required. The script uses Python's standard library.

# Clone the repository
git clone https://github.com/professor606/WPA2-EAPOL-Hash-Generator.git
cd WPA2-EAPOL-Hash-Generator

# Make the script executable
chmod +x script.py

Usage

Run the script using Python 3:

python3 script.py

Interactive Configuration

The script will prompt you for the following details. You can press Enter to use the default values.

  1. SSID: The name of the WiFi network (Default: WiFi).
  2. Password: The known password for the network (required for PMK calculation).
  3. AP MAC: The MAC address of the Access Point (Default: 3c17105e3168).
  4. Client MAC: The MAC address of the Client (Default: ca45f2ff68f2).

Example Output

[?] Configuration Input (Press Enter to use defaults):
    SSID (Default: WiFi): TestAP
    Password (required): strongpassword123
    AP MAC (Default: 3c17105e3168): 
    Client MAC (Default: ca45f2ff68f2): 

[*] Configuration:
    SSID: TestAP
    Pass: strongpassword123

[1] Calculating PMK...
    PMK: <pmk_hex>

...

[5] Generated Hash Line:
WPA*02*<mic>*<mac>*<mac>*<ssid>*<anonce>*<eapol>*02

[+] Saved to: wifi.hc22000
[+] Saved to: pass.txt

Verifying with Hashcat

The script generates a file named wifi.hc22000 and a pass.txt wordlist containing the correct password. You can verify the hash immediately with Hashcat:

hashcat -m 22000 -a 0 wifi.hc22000 pass.txt

If successful, Hashcat will crack the hash and show the password.

Disclaimer

This tool is for educational and testing purposes only. It generates synthetic data based on known credentials. Do not use this tool to assist in unauthorized access to networks you do not own or have permission to test.

About

A Python tool to generate synthetic WPA2 EAPOL (4-Way Handshake) hashes in hc22000 format (Hashcat mode 22000).

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Contributors

Languages