WPA Attack: Difference between revisions
From ivc wiki
				
				
				Jump to navigationJump to search
				
				| No edit summary | No edit summary | ||
| Line 10: | Line 10: | ||
| ** GPGPU acceleration | ** GPGPU acceleration | ||
| * '''[http://www.willhackforsushi.com/Cowpatty.html coWPAtty]''' | * '''[http://www.wirelessdefence.org/Contents/coWPAttyMain.htm coWPAtty Main page]''' '''[http://www.willhackforsushi.com/Cowpatty.html coWPAtty project page]''' | ||
| ** WPA-PSK attack using 4-way handshake dump and ESSID | ** WPA-PSK attack using 4-way handshake dump and ESSID | ||
| ** Passthrough from Pyrite possible (GPGPU acceleration) | ** Passthrough from Pyrite possible (GPGPU acceleration) | ||
Revision as of 14:46, 26 August 2009
WPA is the precursor to WEP and filled a need as a replacement for the fully disclosed and unsecure WEP encryption.
Background
Tools
- coWPAtty Main page coWPAtty project page
- WPA-PSK attack using 4-way handshake dump and ESSID
- Passthrough from Pyrite possible (GPGPU acceleration)
- Pre-computed PMK tables supported
- genpmk:
- Generate "Pairwise Master Key" table for a specific ESSID
 
 
- Church of Wifi wpa-psk rainbow tables
- Pre-computed TMK key tables, 1 million words computed for the top 1000 SSID's
- 7 and 33 GB torrents
- Hak5 single tables downloads
 
