Difference between revisions of "WPA Attack"

From ivc wiki
Jump to navigationJump to search
Line 2: Line 2:


== Background ==
== Background ==
For an excellent explaination, see [http://www.aircrack-ng.org/doku.php?id=airolib-ng the Airolib-ng manual].
* [http://pyrit.wordpress.com/the-twilight-of-wi-fi-protected-access/ The twilight of Wi-Fi Protected Access]
* [http://pyrit.wordpress.com/the-twilight-of-wi-fi-protected-access/ The twilight of Wi-Fi Protected Access]
* [http://en.wikipedia.org/wiki/IEEE_802.11i-2004 IEEE 802.11i Wikipedia page]
* [http://en.wikipedia.org/wiki/IEEE_802.11i-2004 IEEE 802.11i Wikipedia page]

Revision as of 22:21, 26 August 2009

WPA is the precursor to WEP and filled a need as a replacement for the fully disclosed and unsecure WEP encryption.

Background

For an excellent explaination, see the Airolib-ng manual.

Tools

  • pyrit blog Reference manual
    • Like coWPatty and Airolib-ng
    • Pre-compute PMK keys
    • Internal SQLite3 database over precomputed ESSID and PMK combinations
    • Can export to *.cow (coWPAtty) and *.db (Airolib-ng)
    • GPGPU acceleration
  • coWPAtty Main page coWPAtty project page Readme
    • Like Pyrite and Airolib-ng
    • WPA-PSK attack on specific ESSID and captured 4-way handshake dump
    • Passthrough from Pyrite possible (GPGPU acceleration)
    • Pre-computed PMK tables supported
    • genpmk:
      • Generate "Pairwise Master Key" table for a specific ESSID, PMK tables
      • Table-file name usually ends with *.cow
  • Airolib-nb
    • Like coWPatty and Pyrit
    • Precompute TMK keys and attack WPA/WPA2 handshake captures
    • Internal SQLite3 database
    • Can export and import coWPAtty files

Extra:

References