Skip to main content

Fast WPA/WPA2-PSK Handshake Cracking With Cowpatty and Genpmk

Namaste Hackers,



Today My Post is All About How to boost wpa/wpa2-psk handshake cracking with the help of cowpatty and genpmk.

Cowpatty

Cowpatty is also a Cracking Tool, Which Can Also Crack WPA/WPA2-PSK Using Dictionary attack. This tool is pre-installed in Kali Linux / Backtrack but if you are using any another distro of linux then you can install cowpatty with the help of this tutorial. click here

So, As I already Demonstrated In Our Previous Tutorial That How To Crack WPA/WPA2-PSK Handshake File With The Help Of Aircrack-ng And List Of Passwords (Dictionary) and only if we have the correct password in our dictionary, cracking works every time correctly but In Cracking their one more main problem is, Time taken in Cracking. So Basically Here To Save Our Time in cracking process we will use pre-calculated PMK. PMK stand for Pairwise Master Key. To Crack any handshake encryption, cracking tools continuously generate PMK with every single password to find and match the real key of handshake encryption. hence, continuously calculating PMK with every single passpharse is very time consuming process during cracking. so, what we are doing? we will pre-calculate all PMK with the help of genpmk tools in a database then we will use cowpatty to find matching PMK from database with Handshake file for finding real password. Thus, To speed up the cracking process we need to create a pre-calculated database of PMK from wordlist as fast as possible.



To Create Pre-Calculated PMK Database. Here, we will use genpmk.

Open  a Terminal And Type:


:~# genpmk -f [path/to/wordlist] -d [PMK_DATABASE_NAME] -s [ESSID]

Here, -f argument is for passing dictionary file path, -d for new pmk database name and -s is for WPA ESSID

For Example Check Below Screen shot.


After Calculating And Saving All Passpharse PMK in a Database. Now, We will use cowpatty to compare all Database PMKs with captured Handshake file.


Open Terminal And Type Below Commands.



:~# cowpatty -d [PMK_Database_path] -s [ESSID] -r [Handshake_file]

Here, -d argument is for pre-calculated pmk database name, -s is for ESSID and -r is for capture handshake file.

For Example Check Below Screenshot.



Now, For Speed Comparison Between Aircrack-ng and Cowpatty Pre-Calculated PMK Database here i am also providing aircrack-ng screen shot.



As You Can See In Above Screen shot, Cowpatty is cracking on 200053.09 passpharses per second where aircrack-ng is cracking with 1291.29 keys per second.

i think now you got it.


Done!

Written By
               SSB


Comments

  1. can you store diffrent ssid in the same database? can you cahnge caluclated lists ssid or have to calulate each wordlist with each ssid?

    ReplyDelete

Post a Comment

Related Post

Top Visited

Create Simple Packet Sniffer Using Python

how to install burp suite in Linux/Ubuntu 16.04

List of Keyboard Shortcuts Keys for GNOME Desktop (Kali linux / Linux / Ubuntu/*nix )

How to create Phishing Page Using Kali Linux | Webpage Page Cloning Using Kali Linux Social Engineering Toolkit

Big List Of Google Dorks For Sqli Injection

Latest Google Dorks List

Best 1000 User-agents List For Web Scraping

How To Install GDB Peda?

What is the use of Pseudo header in TCP/UDP packets?

How To Create Snake Game Using Python And Tkinter - Simple python games