Difference between revisions of "WPA Attack"

From ivc wiki
Jump to navigationJump to search
Line 43: Line 43:
* [http://www.outpost9.com/files/WordLists.html Outpost9.com] ([http://www.outpost9.com/files/wordlists/dic-0294.zip direct]) - dic-0294 (8.04 MB) ([http://forums.remote-exploit.org/bt4beta-howtos/20095-pyrit-cuda-nvidia-tutorial-nvidia-overclock-instructions.html reference])
* [http://www.outpost9.com/files/WordLists.html Outpost9.com] ([http://www.outpost9.com/files/wordlists/dic-0294.zip direct]) - dic-0294 (8.04 MB) ([http://forums.remote-exploit.org/bt4beta-howtos/20095-pyrit-cuda-nvidia-tutorial-nvidia-overclock-instructions.html reference])
* [http://www.openwall.com/wordlists/ Openwall wordlists] - Multiple languages, small fee
* [http://www.openwall.com/wordlists/ Openwall wordlists] - Multiple languages, small fee
* [http://www.theargon.com/achilles/wordlists/ The Argon various wordlists] - There are WPA versions of these lsits
* [http://www.theargon.com/achilles/wordlists/ The Argon various wordlists] - There are WPA versions of these lists


== References ==
== References ==

Revision as of 23:29, 28 August 2009

WPA is the precursor to WEP and filled a need as a replacement for the fully disclosed and unsecure WEP encryption.

Background

For an excellent explaination, see the Airolib-ng manual.

Tools

  • pyrit blog - Reference manual - Code details
    • Like coWPatty and Airolib-ng
    • Pre-compute PMK keys
    • Internal database over precomputed ESSID and PMK combinations
    • Can export to *.cow (coWPAtty) and *.db (Airolib-ng)
    • GPGPU acceleration
  • coWPAtty Main page - coWPAtty project page - Readme
    • Like Pyrite and Airolib-ng
    • WPA-PSK attack on specific ESSID and captured 4-way handshake dump
    • Passthrough from Pyrite possible (GPGPU acceleration)
    • Pre-computed PMK tables supported
    • genpmk:
      • Generate "Pairwise Master Key" table for a specific ESSID, PMK tables
      • Table-file name should end with *.cow
  • Airolib-nb
    • Like coWPatty and Pyrit
    • Precompute TMK keys and attack WPA/WPA2 handshake captures
    • Internal SQLite3 database
    • Can export and import coWPAtty files

Extra:

Word lists

These are compiled word lists and readily available.

References