What is the difference between a MIC and a PTK and how applications like Aircrack-ng and Pyrit are concerned about? note I'm only concerned with WPA2-PSK
From my research, a PTK is the pairwise transient key, and it consists of the Anonce (random prime number), Snonce (nonce from supplicant), essid and pre-shared key (passphrase). Some sources say that these programs create PMKs and compare the PMKs to the PTKs. Is that correct?
Some other sources say that what we are concerned about is the MIC. Some say that the MIC is a hash value and programs like Pyrit and Aircrack create these MIC hashes and compare them to the MIC hash captured in the 4-way handshake.
Which one is "really" correct?
- source that says MIC - Four-way Handshake in WPA-Personal (WPA-PSK)
- source that says PTK - can an attacker find WPA2 passphrase given WPA key data and WPA MIC