First, we generate the PMK with the pre-shared key and ESSID of the Access Point.
PMK = PBKDF2(PSK, ESSID, 4096)
Then, once we have the PMK, we substitute it into the next algorithm to calculate the PMKID.
PMKID = HMAC-SHA1-128(PMK, "PMK Name", AP-Mac, St-Mac)
What is the WIFI Protected Access Networks?
Wi-Fi Protected Access (WPA), Wi-Fi Protected Access 2 (WPA2), and Wi-Fi Protected Access 3 (WPA3) are security certification programs developed by the Wi-Fi Alliance after the year 2000 to secure wireless networks. These standards were introduced in response to significant vulnerabilities discovered in the earlier Wired Equivalent Privacy (WEP) system.

What is the authentication Types?
WPA (Wi-Fi Protected Access): Introduced as an interim improvement over WEP, WPA offers better encryption through TKIP (Temporal Key Integrity Protocol), but it is still less secure than newer standards.WPA2 (Wi-Fi Protected Access II): A significant advancement over WPA, WPA2 uses AES (Advanced Encryption Standard) for robust security. It has been the standard for many years, providing strong protection for most networks.
What Are the Two Modes for WPA Networks?
WPA-Personal: It uses pre-shared keys (PSK) and is designed for personal use (home use).WPA-Enterprise: It is especially designed for organizations.Introducing WPA/WPA2 Personal (PSK)?
Wi-Fi Protected Access (WPA) Personal was created to replace Wired Equivalent Privacy (WEP). WPA originally implemented the Temporal Key Integrity Protocol (TKIP), which used a dynamic per-packet key to address WEP's vulnerabilities, particularly those involving initialization vector attacks. In addition, WPA introduced Message Integrity Checks (MICs), improving security over the Cyclic Redundancy Checks (CRCs) used by WEP. WPA2 introduced support for CCMP and AES encryption modes, to provide more secure communications

Introducing WPA/WPA2 Personal (PSK) Attacks?