WPA PMKID-Only — Hashcat Mode 22001
TL;DR — Mode 22001 is a specialised variant of mode 22000 for workflows where the Pairwise Master Key (PMK) has been pre-computed and you want to test it against PMKID hashes without re-running PBKDF2. Used in research and multi-network attack contexts; rarely the right choice for owner recovery.
What mode 22001 does differently
Standard WPA recovery (mode 22000) takes a candidate password, runs PBKDF2-HMAC-SHA1 (4096 iterations) with the SSID as salt to derive the PMK, then uses the PMK to verify against PMKID or EAPOL.
Mode 22001 skips the PBKDF2 step — input is PMK directly. This is useful when you've pre-computed PMKs from a wordlist for many SSIDs and want to test them against captured PMKIDs in a separate fast pass.
For typical owner recovery where you have one network and one captured handshake, mode 22000 is the correct choice. Mode 22001 is research/multi-target territory.
When mode 22001 makes sense
Multi-target rainbow-table-style workflows: pre-compute PMKs for top-1M passwords across common SSIDs, then test against any captured PMKID near-instantly. Used by penetration testers and security researchers studying password reuse patterns.
Not relevant for single-network owner recovery. Mode 22000 is simpler and equally effective for that case.
Frequently Asked Questions
Is mode 22001 useful for owner recovery?
What's the throughput difference?
Related references
Have a handshake to recover?
Upload your .hc22000 (or .pcap/.cap/.hccapx and we'll convert) for a free analysis. Pay only if recovery succeeds.
Run a free WPA analysis