HashCat is ready to own WPA2 WiFi passwords with this new technique (2018)

HashCat has upgraded their techniques on how to capture WPA2 WIFI Passwords.

On the Hashcat forum, the following was stated:



This attack was discovered accidentally while looking for new ways to attack the new WPA3 security standard. WPA3 will be much harder to attack because of its modern key establishment protocol called “Simultaneous Authentication of Equals” (SAE).

The main difference from existing attacks is that in this attack, capture of a full EAPOL 4-way handshake is not required. The new attack is performed on the RSN IE (Robust Security Network Information Element) of a single EAPOL frame.