Results 1 to 9 of 9

Thread: crack wpa

Hybrid View

  1. #1
    Good friend of the forums spawn's Avatar
    Join Date
    Jan 2010
    Posts
    280

    Default crack wpa

    definitively

    how to crack wpa keys, without it is in dictionary.

    it only saw brute-force .

    how precompute the hashes ? only software for this ?

    i already used the distributed passoword recovery, in some cases it functions very well

    it is possible with cowpatty ?

    passwords between 1 and 12 caracters only lowcase caracters and digits
    its possible crack ?

    what the time estimated ?


    sorry for my english ...

    thanks in advance

  2. #2
    Moderator theprez98's Avatar
    Join Date
    Jan 2010
    Location
    Maryland
    Posts
    2,533

    Default

    Quote Originally Posted by spawn View Post
    how to crack wpa keys, without it is in dictionary.
    Not currently possible.

    Quote Originally Posted by spawn View Post
    passwords between 1 and 12 caracters only lowcase caracters and digits
    its possible crack ?

    what the time estimated ?
    Again, not possible given the size of the generated tables.
    "\x74\x68\x65\x70\x72\x65\x7a\x39\x38";

  3. #3
    Good friend of the forums spawn's Avatar
    Join Date
    Jan 2010
    Posts
    280

    Default

    Quote Originally Posted by theprez98 View Post
    Not currently possible.


    Again, not possible given the size of the generated tables.
    Ohhhh!!!!!!

    alright !

    thanks ...

    sometimes the question isn't objective



    your answers she was objective

    again ,,,

    thanks

  4. #4
    Junior Member
    Join Date
    Feb 2009
    Posts
    35

    Default

    Sorry to bump a month old thread but you may be interested in following this:

    forums.remote-exploit.org/showthread.php?t=18065

    and

    aircrack-ng.org/doku.php?id=tkiptun-ng

  5. #5
    Senior Member Thorn's Avatar
    Join Date
    Jan 2010
    Location
    The Green Dome
    Posts
    1,509

    Default

    Quote Originally Posted by Oktain View Post
    Sorry to bump a month old thread but you may be interested in following this:

    forums.remote-exploit.org/showthread.php?t=18065

    and

    aircrack-ng.org/doku.php?id=tkiptun-ng
    Let's be clear on a several things:

    • WPA has always had the known TKIP flaw. WPA was made to bridge WEP and WPA2.
    • This attack never reveals the actual WPA key.
    • This attack works only one way, AP to client, and only with small packets (e.g. ARP packets). Furthermore, it can only be used for between 8-15 packets. After that, the attacker would need decode it all over again for the next 8-15 packets.


    All-in-all, it's only mildly interesting, especially if you are using WPA2 and a VPN on top of that for any critical data.
    Thorn
    Stop the TSA now! Boycott the airlines.

  6. #6
    Junior Member
    Join Date
    Feb 2009
    Posts
    35

    Default

    Quote Originally Posted by Thorn View Post
    Let's be clear on a several things:

    • WPA has always had the known TKIP flaw. WPA was made to bridge WEP and WPA2.
    • This attack never reveals the actual WPA key.
    • This attack works only one way, AP to client, and only with small packets (e.g. ARP packets). Furthermore, it can only be used for between 8-15 packets. After that, the attacker would need decode it all over again for the next 8-15 packets.


    All-in-all, it's only mildly interesting, especially if you are using WPA2 and a VPN on top of that for any critical data.
    Very true.

    I should have outlined that when posting. However to quote some random internet source I just happen to recall, it's "battered, but not broken".

    As a good pen tester it's good to know the flaw, how it works, and of course the solution. Thanks for the follow up on that Thorn!

  7. #7
    Senior Member Thorn's Avatar
    Join Date
    Jan 2010
    Location
    The Green Dome
    Posts
    1,509

    Default

    Quote Originally Posted by Oktain View Post
    Very true.

    I should have outlined that when posting. However to quote some random internet source I just happen to recall, it's "battered, but not broken".

    As a good pen tester it's good to know the flaw, how it works, and of course the solution. Thanks for the follow up on that Thorn!
    No problem, I just didn't want someone tripping across this thread to conclude that breaking WPA is something that's easily done.
    Thorn
    Stop the TSA now! Boycott the airlines.

  8. #8
    Senior Member Thorn's Avatar
    Join Date
    Jan 2010
    Location
    The Green Dome
    Posts
    1,509

    Default

    Quote Originally Posted by noway View Post
    how to crack wpa that the question
    That is answered in multiple threads. Please search.
    Thorn
    Stop the TSA now! Boycott the airlines.

  9. #9
    Good friend of the forums spawn's Avatar
    Join Date
    Jan 2010
    Posts
    280

    Default

    Be very clean . the idea

    Again,
    thanks folks ...

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •