is a C-based tool for running a brute-force dictionary attack against WPA-PSK and pre-shared WPA keys.

coWPAtty Download - Audit Pre-shared WPA Keys

If you are auditing WPA-PSK networks, you can use this tool to identify weak passphrases that were used to generate the PMK. Supply a libpcap capture file that includes the 4-way handshake, a dictionary file of passphrases to guess with, and the SSID for the network.

What is coWPAtty?

coWPAtty is the implementation of an offline dictionary attack against WPA/WPA2 networks using PSK-based authentication (e.g. WPA-Personal). Many enterprise networks deploy PSK-based authentication mechanisms for WPA/WPA2 since it is much easier than establishing the necessary RADIUS, supplicant and certificate authority architecture needed for WPA-Enterprise authentication. coWPAtty can implement an accelerated attack if a precomputed PMK file is available for the SSID that is being assessed.

coWPAtty Usage

Example:



Full Output:



This tool can also accept dictionary words from STDIN, allowing us to utilize a tool such as John the Ripper to create lots of word permutations from a dictionary file.



In the default configuration of John the Ripper, common permutations of dictionary words will be sent as potential passwords to coWPAtty.

This tool is based around the whitepaper by Robert Moskowitz:

Weakness in Passphrase Choice in WPA Interface

There are also the following to check out:

wifite – Mass Wifi WEP / WPA Key Cracking Tool
aircrack-ng – WEP and WPA-PSK Key Cracking Program
Reaver Download – Hack WPS Pin WiFi Networks

coWPAtty

You can download coWPAtty here:

cowpatty-2.0.tgz

Or read more here.



Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here