Académique Documents
Professionnel Documents
Culture Documents
https://www.blackmoreops.com/2014/03/10/cracking-wifi-w...
Cracking Process
We can crack using few different process.
1. Using Pyrit
2. Using Cowpatty
Thats it. It will take few minutes to go through the whole Database Table to get the password if it existed
in the Dictionary.As you can see, 159159186.00 PMKs per second was the speed and it took less than 1
second to crack it. This is by far the fastest. I also had to blank out much of the screenshot.
Note: I tried it from a different workstation with a NVIDIA GTX460 Graphics card with CUDA and
Cpyrit-CUDA installed. Obviously, this was much faster than my Laptop. But either way, this is super fast.
1 of 3
23/12/2016, 14:12
https://www.blackmoreops.com/2014/03/10/cracking-wifi-w...
Speed this way? 7807 PMKs per second. Much slower for my taste.
Export to cowpatty
I hope up to this point, everything went as planned and worked out. From Pyrit, we can push our output to
either cowpatty or airolib-ng. All my tests shows that cowpatty is a lot more faster, so Ill stick with that.
So lets make our cowpatty file. This is again simple, issue the following command to export your output to
cowpatty.
pyrit -e BigPond -o cow.out export_cowpatty
2 of 3
23/12/2016, 14:12
https://www.blackmoreops.com/2014/03/10/cracking-wifi-w...
Once you type it in, youll a bunch of passwords being tried against your hash file. This will keep going
until the end of the file. Once a matching password is found in the dictionary file, the cracking process will
stop with an output containing the password.
And bingo, it found a matching password. Look at the number of passwords tried in a seconds
164823.00 passphrases/second
.
NOTE: cowpatty will fail if your password/dictionary file is larger than 2GB. Youll have to stick to airolib-ng
even though thats slower.
Pages: 1 2 3 4
3 of 3
23/12/2016, 14:12