Difference between revisions of "WPA Attack"

From ivc wiki
Jump to navigationJump to search
(New page: WPA is the precursor to WEP and filled a need as a replacement for the fully disclosed and unsecure WEP encryption. == Background == * [http://pyrit.wordpress.com/the-twilight-of-wi-fi-pr...)
 
Line 12: Line 12:
* '''[http://www.willhackforsushi.com/Cowpatty.html coWPAtty]'''
* '''[http://www.willhackforsushi.com/Cowpatty.html coWPAtty]'''
** WPA-PSK attack using 4-way handshake dump and ESSID
** WPA-PSK attack using 4-way handshake dump and ESSID
** Passthrough from Pyrite possible (GPGPU accelerated)
** Passthrough from Pyrite possible (GPGPU acceleration)
** Pre-computed PMK tables supported
** Pre-computed PMK tables supported
** genpmk:
*** Generate Pairwise Master Key table for a specific ESSID


* '''[http://www.renderlab.net/projects/WPA-tables/ Church of Wifi wpa-psk rainbow tables]'''
* '''[http://www.renderlab.net/projects/WPA-tables/ Church of Wifi wpa-psk rainbow tables]'''

Revision as of 16:41, 26 August 2009

WPA is the precursor to WEP and filled a need as a replacement for the fully disclosed and unsecure WEP encryption.

Background

Tools

  • pyrit blog
    • Pre-compute PMK keys
    • GPGPU acceleration
  • coWPAtty
    • WPA-PSK attack using 4-way handshake dump and ESSID
    • Passthrough from Pyrite possible (GPGPU acceleration)
    • Pre-computed PMK tables supported
    • genpmk:
      • Generate Pairwise Master Key table for a specific ESSID