Difference between revisions of "WPA Attack"

From ivc wiki
Jump to navigationJump to search
Line 10: Line 10:
** GPGPU acceleration
** GPGPU acceleration


* '''[http://www.willhackforsushi.com/Cowpatty.html coWPAtty]'''
* '''[http://www.wirelessdefence.org/Contents/coWPAttyMain.htm coWPAtty Main page]''' '''[http://www.willhackforsushi.com/Cowpatty.html coWPAtty project page]'''
** WPA-PSK attack using 4-way handshake dump and ESSID
** WPA-PSK attack using 4-way handshake dump and ESSID
** Passthrough from Pyrite possible (GPGPU acceleration)
** Passthrough from Pyrite possible (GPGPU acceleration)

Revision as of 16:46, 26 August 2009

WPA is the precursor to WEP and filled a need as a replacement for the fully disclosed and unsecure WEP encryption.

Background

Tools

  • pyrit blog
    • Pre-compute PMK keys
    • GPGPU acceleration
  • coWPAtty Main page coWPAtty project page
    • WPA-PSK attack using 4-way handshake dump and ESSID
    • Passthrough from Pyrite possible (GPGPU acceleration)
    • Pre-computed PMK tables supported
    • genpmk:
      • Generate "Pairwise Master Key" table for a specific ESSID