Difference between revisions of "WPA Attack"
From ivc wiki
Jump to navigationJump to search
Line 10: | Line 10: | ||
** GPGPU acceleration | ** GPGPU acceleration | ||
* '''[http://www.willhackforsushi.com/Cowpatty.html coWPAtty]''' | * '''[http://www.wirelessdefence.org/Contents/coWPAttyMain.htm coWPAtty Main page]''' '''[http://www.willhackforsushi.com/Cowpatty.html coWPAtty project page]''' | ||
** WPA-PSK attack using 4-way handshake dump and ESSID | ** WPA-PSK attack using 4-way handshake dump and ESSID | ||
** Passthrough from Pyrite possible (GPGPU acceleration) | ** Passthrough from Pyrite possible (GPGPU acceleration) |
Revision as of 15:46, 26 August 2009
WPA is the precursor to WEP and filled a need as a replacement for the fully disclosed and unsecure WEP encryption.
Background
Tools
- coWPAtty Main page coWPAtty project page
- WPA-PSK attack using 4-way handshake dump and ESSID
- Passthrough from Pyrite possible (GPGPU acceleration)
- Pre-computed PMK tables supported
- genpmk:
- Generate "Pairwise Master Key" table for a specific ESSID
- Church of Wifi wpa-psk rainbow tables
- Pre-computed TMK key tables, 1 million words computed for the top 1000 SSID's
- 7 and 33 GB torrents
- Hak5 single tables downloads