WPA-PBKDF2-PMKID+EAPOL — Hashcat Mode 22000
TL;DR — Mode 22000 is the modern unified format for WPA/WPA2 password hashes. It replaces the older modes 2500 (EAPOL) and 16800 (PMKID) by accepting both forms in a single .hc22000 hash file. The cipher and KDF are unchanged from earlier WPA: AES-CCMP with PBKDF2-HMAC-SHA1 (4096 iterations). Recovery feasibility depends entirely on password strength.
What mode 22000 unifies
Before 2020, WPA recovery used two different Hashcat modes: 2500 for the classic 4-way EAPOL handshake captured during client association, and 16800 for the PMKID extracted directly from the access point. Both encoded the same underlying WPA secret but in different hash formats.
Mode 22000 (introduced in Hashcat 6.0) accepts both forms in a single .hc22000 file. Each line carries a marker indicating PMKID or EAPOL plus the encoded data. This simplification reduced common workflow errors and made recovery tooling more uniform.
The cryptographic core is unchanged: WPA/WPA2-Personal uses PBKDF2-HMAC-SHA1 with 4096 iterations to derive the Pairwise Master Key (PMK) from the passphrase + SSID. The PMK is then used in the 4-way handshake or PMKID computation.
- Hashcat mode: 22000 (replaces 2500 and 16800)
- File format: .hc22000
- KDF: PBKDF2-HMAC-SHA1, 4096 iterations
- Salt: SSID (network name)
- Cipher: AES-CCMP (in actual data transit)
- Default for WPA/WPA2-Personal in IEEE 802.11i
Why 4096 iterations matter
WPA's 4096-iteration PBKDF2 was a deliberate cost choice in IEEE 802.11i (2004). At the time, it was meaningfully slow on consumer CPUs. By 2026, modern GPUs verify 1-3 million WPA candidates per second per high-end card.
This means dictionary attacks against common passwords complete in minutes. Brute-force against short alphanumeric passwords (8-9 chars) is feasible on multi-GPU clusters within hours to days.
Strong random passphrases (12+ characters from a wide character set) are not realistically recoverable on any feasible compute budget. This is the standard 'password strength matters' line.
PMKID vs EAPOL
PMKID is a single 16-byte hash transmitted by the AP in the first message of association. It can be captured passively without any client traffic, making collection much simpler than the full handshake.
EAPOL handshake is the full 4-message exchange between client and AP during association. Capturing requires either witnessing a client connection or sending deauthentication frames to force re-association.
Mode 22000 accepts both in the same hash file. From a recovery perspective, both verify the same underlying WPA passphrase — there's no preference once you have either form.
Recovery realism
WPA/WPA2 recovery follows the modern 'password strength matters' pattern. Common consumer router default passwords (often 8-character random alphanumeric) are within reach of multi-GPU brute force. Personal passwords with predictable patterns (birthdays, kid names, common phrases) are recoverable via dictionary or pattern attacks.
Strong passphrases — 14+ characters with mixed character classes, unrelated to common patterns — are practically secure. We honestly assess based on password expectations.
For your own home network where you simply forgot the password, the recovery path depends on what you set: a simple personal password is recoverable; a long random password from your router setup wizard probably isn't.
WPA3-Personal differences
WPA3-Personal uses Simultaneous Authentication of Equals (SAE) instead of PSK. SAE is resistant to offline dictionary attacks — captured handshakes don't leak material that an attacker can verify against candidate passwords. Mode 22000 doesn't apply to WPA3.
Most consumer networks in 2026 still use WPA2-Personal due to client device compatibility. WPA3 adoption is increasing but not dominant. If your network is WPA3-only, recovery is fundamentally harder — typically only via the router admin interface.
Frequently Asked Questions
Is recovering my own home WiFi password legal?
Why was mode 22000 introduced if 2500/16800 worked?
Can I run mode 22000 myself with hashcat?
What's the difference between mode 22000 and 22001?
Will my router log my recovery attempt?
Are recovery rates published anywhere?
Related references
Have a handshake to recover?
Upload your .hc22000 (or .pcap/.cap/.hccapx and we'll convert) for a free analysis. Pay only if recovery succeeds.
Run a free WPA analysis