Difference between revisions of "WPA Attack"
From ivc wiki
Jump to navigationJump to search
Line 2: | Line 2: | ||
== Background == | == Background == | ||
For an excellent explaination, see [http://www.aircrack-ng.org/doku.php?id=airolib-ng the Airolib-ng manual]. | |||
* [http://pyrit.wordpress.com/the-twilight-of-wi-fi-protected-access/ The twilight of Wi-Fi Protected Access] | * [http://pyrit.wordpress.com/the-twilight-of-wi-fi-protected-access/ The twilight of Wi-Fi Protected Access] | ||
* [http://en.wikipedia.org/wiki/IEEE_802.11i-2004 IEEE 802.11i Wikipedia page] | * [http://en.wikipedia.org/wiki/IEEE_802.11i-2004 IEEE 802.11i Wikipedia page] |
Revision as of 22:21, 26 August 2009
WPA is the precursor to WEP and filled a need as a replacement for the fully disclosed and unsecure WEP encryption.
Background
For an excellent explaination, see the Airolib-ng manual.
Tools
- pyrit blog Reference manual
- Like coWPatty and Airolib-ng
- Pre-compute PMK keys
- Internal SQLite3 database over precomputed ESSID and PMK combinations
- Can export to *.cow (coWPAtty) and *.db (Airolib-ng)
- GPGPU acceleration
- coWPAtty Main page coWPAtty project page Readme
- Like Pyrite and Airolib-ng
- WPA-PSK attack on specific ESSID and captured 4-way handshake dump
- Passthrough from Pyrite possible (GPGPU acceleration)
- Pre-computed PMK tables supported
- genpmk:
- Generate "Pairwise Master Key" table for a specific ESSID, PMK tables
- Table-file name usually ends with *.cow
- Airolib-nb
- Like coWPatty and Pyrit
- Precompute TMK keys and attack WPA/WPA2 handshake captures
- Internal SQLite3 database
- Can export and import coWPAtty files
Extra:
- Church of Wifi wpa-psk rainbow tables
- Pre-computed TMK key tables, 1 million words computed for the top 1000 SSID's
- 7 and 33 GB torrents
- Hak5 single tables downloads