//
you're reading...
Linux, security, WiFi

WiFi – WPA-PSK Security assessment with Pre-computed hashes

This post is for educational purposes only !!!

On my eeepc i reached 36492.90 keys/second

#sudo -i

#apt-get install libssl-dev libpcap0.8-dev

#wget http://wirelessdefence.org/Contents/Files/cowpatty-4.6.tgz

#tar -xzf cowpatty-4.6.tgz

#cd cowpatty-4.6

root@pilio-laptop:/cowpatty/cowpatty-4.6# make

cc -pipe -Wall -DOPENSSL  -O2 -g3 -ggdb   -c -o md5.o md5.c

cc -pipe -Wall -DOPENSSL  -O2 -g3 -ggdb   -c -o sha1.o sha1.c

cc -pipe -Wall -DOPENSSL  -O2 -g3 -ggdb   -c -o utils.o utils.c

cc -pipe -Wall -DOPENSSL  -O2 -g3 -ggdb   -c -o cowpatty.o cowpatty.c

cowpatty.c: In function ‘main’:

cowpatty.c:1016: warning: dereferencing pointer ‘eapkeypacket’ does break strict-aliasing rules

cowpatty.c:1012: note: initialized from here

cc -pipe -Wall -DOPENSSL  -O2 -g3 -ggdb   -c -o genpmk.o genpmk.c

cc -pipe -Wall -DOPENSSL  -O2 -g3 -ggdb cowpatty.c -o cowpatty utils.o md5.o sha1.o -lpcap -lcrypto

cowpatty.c: In function ‘main’:

cowpatty.c:1016: warning: dereferencing pointer ‘eapkeypacket’ does break strict-aliasing rules

cowpatty.c:1012: note: initialized from here

cc -pipe -Wall -DOPENSSL  -O2 -g3 -ggdb genpmk.c -o genpmk utils.o sha1.o -lpcap -lcrypto

root@pilio-laptop:/cowpatty/cowpatty-4.6#

root@pilio-laptop:/cowpatty/cowpatty-4.6# file cowpatty genpmk

cowpatty: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.15, not stripped

genpmk:   ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked (uses shared libs), for GNU/Linux 2.6.15, not stripped

root@pilio-laptop:/cowpatty/cowpatty-4.6#

root@pilio-laptop:/cowpatty/cowpatty-4.6# ./genpmk -f dict  -d hashfile -s myssid

genpmk 1.1 – WPA-PSK precomputation attack. <jwright@hasborg.com>

File hashfile does not exist, creating.

key no. 1000: apportion

key no. 2000: cantabile

key no. 3000: contract

key no. 4000: divisive

4090 passphrases tested in 59.15 seconds:  69.15 passphrases/second

root@pilio-laptop:/cowpatty/cowpatty-4.6#

root@pilio-laptop:/cowpatty/cowpatty-4.6# ./cowpatty -r wpa2psk-linksys.dump -d ./hashfile -s myssid

cowpatty 4.6 – WPA-PSK dictionary attack. <jwright@hasborg.com>

Collected all necessary data to mount crack against WPA2/PSK passphrase.

Starting dictionary attack.  Please be patient.

The PSK is “dictionary”.

4091 passphrases tested in 0.11 seconds:  36492.90 passphrases/second

root@pilio-laptop:/cowpatty/cowpatty-4.6#

HW Configuration

root@pilio-laptop:/cowpatty/cowpatty-4.6# hdparm -t /dev/sda6

/dev/sda6:

Timing buffered disk reads:  200 MB in  3.00 seconds =  66.65 MB/sec

root@pilio-laptop:/cowpatty/cowpatty-4.6# dmidecode |grep -i cpu

Version: Intel(R) Atom(TM) CPU N270   @ 1.60GHz

root@pilio-laptop:/cowpatty/cowpatty-4.6#

Discussion

Comments are closed.