Calificación:
  • 0 voto(s) - 0 Media
  • 1
  • 2
  • 3
  • 4
  • 5

[-]
Etiquetas
wpa crackeo cowpatty de 2 encriptacion

CoWPAtty 2.0 = Crackeo de Encriptacion WPA
#1
[Imagen: cowpatty.gif]

Version 2.0 para este Aplicacion de Crackeo de Contraseñas Wireless ( WPA ) mediante diccionario.

DOWNLOAD

Esta aplicacion ya va incluida en las ultimas version del famoso LiveCD Backtrack.
Wink

Mas datos

coWPAtty Execution

coWPAtty requires that OpenSSL be installed on your system. After downloading coWPAtty, install it using the following steps:

# tar zxvf Cowpatty-2.0.tar.gz
# cd cowpatty
# make


You now have built the coWPAtty binary. Execute the binary by supplying the libpcap that includes a captured four-way handshake, a dictionary file of passphrases from which to guess and the SSID of the network. The options are:

-f: dictionary file

-r: packet capture file

-s: network SSID

The binary is executed with the following command:


# ./cowpatty -r datafilename \
-f dictionaryfile -s SSID


If there is no WPA four-way exchange, the following message is displayed:

End of pcap capture file, incomplete TKIP four-way exchange.
Try using a different capture.

If the file did contain the four-way handshake, the following is displayed:


coWPAtty 2.0 - WPA-PSK dictionary attack.
<jwright>
Collected all necessary data to mount crack against
passphrase. Loading words into memory, please be
patient ... Done (XX words). Starting dictionary
attack. Please be patient.


coWPAtty continues the intensive and relatively slow process of testing each dictionary word as a passphrase by using the PBKDF2 function and making 4096 SHA-1 passes on each passphrase in the supplied data set. coWPAtty updates its progress until it reports either it has found the WPA-PSK passphrase or it was unable to identify the WPA-PSK passphrase from the supplied dictionary file. As noted in the documentation, coWPAtty is not fast, due to the number of repetitions required for each passphrase. Expect approximately 45 keys per second in actual use.

For users who care to demonstrate this tool but are unable to capture the network data, coWPAtty includes a sample packet capture file, named eap-test.dump, that was generated from an AP with SSID somethingclever and a PSK of family movie night. To demonstrate the attack utilizing the supplied file, enter the following command ensuring that the supplied dictionary has the phrase somethingclever included:

# ./cowpatty -r eap-test.dump \
-f dictionaryfile -s somethingclever
Zero13

"Así como el hierro se oxida por falta de uso, también la inactividad destruye el intelecto.." - Leonardo Da Vinci

Síguenos en TwitterYoutube

Responder
#2
Tambien hay creadores de diccionario.
Responder
#3
[quote user="lampi" post="9048"]Tambien hay creadores de diccionario.[/quote]

Genial! Wink pues estaria bien, que estuvieran en este mismo hilo...
Zero13

"Así como el hierro se oxida por falta de uso, también la inactividad destruye el intelecto.." - Leonardo Da Vinci

Síguenos en TwitterYoutube

Responder


Posibles temas similares...
Tema Autor Respuestas Vistas Último mensaje
  Video: Vulnerabilidad Sistema Encriptacion Wep Zero13 3 4,688 02-04-2007, 17:32
Último mensaje: tillomarrano

Salto de foro:


Usuarios navegando en este tema: 1 invitado(s)