Download Part 11: Genpmk and cowpatty to Crack WPA-PSK with Backtrack 3 by video on savevid.com
Download Part 11: Genpmk and cowpatty to Crack WPA-PSK with Backtrack 3 by streaming video in flv, mp4, avi formats direct easily on Savevid.com.
Part 11: Genpmk and cowpatty to Crack WPA-PSK with Backtrack 3 by http:/...
- Rate: Please rate this video Views: 1768 Downloads: 460
- Description: In this tutorial we will be using genpmk for Precomputing WPA PMK to crack WPA PSK with cowpatty.Follow the steps from:PART 10:Cracking WPA-PSK with a dictionary attack in Backtrack 3 to get the fourway handshake.genpmk is used to precompute the hash files in a similar way to Rainbow tables is used to pre-hash passwords in Windows LANMan attacks. There is a slight difference however in WPA in that the SSID of the network is used as well as the WPA-PSK to "salt" the hash. This means that we need a different set of hashes for each and every unique SSIDShow notesPrecomputing file with genpmkopen konsole typegenpmk -f dictionaryfile.txt -d hashfile -s BTHomeHub-ED36-f = Your dictionary-d = Output pmk file (usally stored in root directory)-s = Essid (AP name)Using new pmk with cowpattycowpatty -r psk*.cap -d hashfile -s BTHomeHub-ED36-r = Captured fourway handshake file-d = Your created pmk file-s = essid (AP name)Cracked :)This video was made for othersBy DapiratesEnjoy :)Please feel free to leave any comments
- Category: Flag video