Sistemas operativos > Aplicaciones y diccionarios windows
Cowpatty Fuerza bruta/diccionario WPA1 y WPA2
*dudux:
CoWPAtty es un programa para WPA Y WPA2 mediante fuerza bruta o diccionario
principal: http://www.wirelessdefence.org/Contents/coWPAttyMain.htm
descarga cowpatty 4.2 :
descarga cowpatty 4.0 :
Version Plus http://cowpattyp.tk/
cowpatty plus
libssl-dev y openssl
--- Código: ---
lenny:/home/dudu/cowpattyp# make
cc -pipe -Wall -DOPENSSL -g3 -ggdb -c -o md5.o md5.c
cc -pipe -Wall -DOPENSSL -g3 -ggdb -c -o sha1.o sha1.c
sha1.c: In function ‘pbkdf2_sha1_f’:
sha1.c:148: warning: pointer targets in initialization differ in signedness
sha1.c:164: warning: pointer targets in passing argument 1 of ‘hmac_sha1_vector’ differ in signedness
sha1.c:169: warning: pointer targets in passing argument 1 of ‘hmac_sha1’ differ in signedness
sha1.c: In function ‘sha1_prf’:
sha1.c:213: warning: pointer targets in initialization differ in signedness
sha1.c:213: warning: pointer targets in initialization differ in signedness
sha1.c:213: warning: pointer targets in initialization differ in signedness
cc -pipe -Wall -DOPENSSL -g3 -ggdb -c -o utils.o utils.c
cc -pipe -Wall -DOPENSSL -g3 -ggdb -c -o cowpattyp.o cowpattyp.c
cc -pipe -Wall -DOPENSSL -g3 -ggdb -c -o genpmkp.o genpmkp.c
cc -pipe -Wall -DOPENSSL -g3 -ggdb cowpattyp.c -o cowpattyp utils.o md5.o sha1.o -lpcap -lcrypto
cc -pipe -Wall -DOPENSSL -g3 -ggdb genpmkp.c -o genpmkp utils.o sha1.o -lpcap -lcrypto
--- Fin del código ---
--- Código: ---lenny:/home/dudu/cowpattyp# chmod +x cowpattyp
lenny:/home/dudu/cowpattyp# cp cowpattyp /usr/bin/
lenny:/home/dudu/cowpattyp# cowpattyp
--- Fin del código ---
--- Código: ---lenny:/home/dudu# cowpattyp
cowpatty 4.0 Plus!- WPA-PSK dictionary attack. <jwright@hasborg.com>
Plus! version added by gusmp
cowpatty : Must supply a list of passphrases in a file with -f, a hash file
with -d or to do brute force with -b option.
Use "-f -" to accept words on stdin.
Usage: cowpattyp [options]
-f Dictionary file
-d Hash file (genpmk)
-b Brute force's alphabet. See note A below
-M (only required with -b) maximum passphrase's length
-m (only required with -b) minimum passphrase's length
-r Packet capture file
-s Network SSID (enclose in quotes if SSID includes spaces)
-h Print this help information and exit
-v Print verbose information (more -v for more verbosity)
-V Print program version and exit
-R Start/restore from a previous session saved in a file
Note A: b10 numbers in base 10
b16 numbers in base 16 (incase sensitive)
b16u numbers in base 16 (upper case)
b16l numbers in base 16 (lower case)
let letters (incase sensitive)
letu letters (upper case)
letl letters (lower case)
letn letters (incase sensitive) plus numbers
Other codes will be understand as a alphabet defined by user
lenny:/home/dudu#
--- Fin del código ---
--- Código: ---lenny:/home/dudu# gen
gencat genisoimage genkdmconf genpmkp
lenny:/home/dudu# genpmkp
genpmkp 1.0 Plus! - WPA-PSK precom****tion attack. <jwright@hasborg.com>
genpmkp: Must specify a dictionary file with -f or an alphabet with -b
Usage: genpmkp [options]
-f Dictionary file
-d Output hash file
-b Brute force's alphabet
-M (only required with -b) maximum passphrase's length
-m (only required with -b) minimum passphrase's length
-p (optional with -b)Add this prefix to brute force's passphrases
-R Start/restore from a previous session saved in a file
-s Network SSID
-h Print this help information and exit
-v Print verbose information (more -v for more verbosity)
-V Print program version and exit
After precomputing the hash file, run cowpatty with the -d argument.
lenny:/home/dudu#
--- Fin del código ---
Vulnerar WPA con cowpatty
cuales son las opciones que trae:
--- Citar ---Opciones:
-f <diccionario.txt>
-r <archivo-captura>
-s <SSID>
-h <help>
-v <modo verbose>
-V <Versión del programa>
--- Fin de la cita ---
Un ejemplo de como hacer rular cowpatty:
# cowpatty -r archivo.pcap -f /diccionario.txt -s <ssid de la red>
Ejemplo del readme de cowpatty:
# cowpatty -r eap-test.dump -f dict -s somethingclever
Hwagm:
añadido a wifiway
genpmk and cowpatty
Ricardo:
una pregunta es decir que si le pongo wpa-tkip a mi router me puede descifrar la clave? y si esto como lo instalo en wifislax 3.1 me gustaria probarlo.
rh3nt0n:
--- Cita de: Ricardo en 20-01-2008, 19:13 (Domingo) ---una pregunta es decir que si le pongo wpa-tkip a mi router me puede descifrar la clave? y si esto como lo instalo en wifislax 3.1 me gustaria probarlo.
--- Fin de la cita ---
ya lo incluye.
*dudux:
nueva version
cowpatty 4.2
Mirar al principio del post para descarga directa
Navegación
[#] Página Siguiente
Ir a la versión completa