how to crack wpa keys, without it is in dictionary.
it only saw brute-force .
how precompute the hashes ? only software for this ?
i already used the distributed passoword recovery, in some cases it functions very well
it is possible with cowpatty ?
passwords between 1 and 12 caracters only lowcase caracters and digits
its possible crack ?
what the time estimated ?
sorry for my english ...
thanks in advance
Sorry to bump a month old thread but you may be interested in following this:
- WPA has always had the known TKIP flaw. WPA was made to bridge WEP and WPA2.
- This attack never reveals the actual WPA key.
- This attack works only one way, AP to client, and only with small packets (e.g. ARP packets). Furthermore, it can only be used for between 8-15 packets. After that, the attacker would need decode it all over again for the next 8-15 packets.
All-in-all, it's only mildly interesting, especially if you are using WPA2 and a VPN on top of that for any critical data.
Stop the TSA now! Boycott the airlines.
I should have outlined that when posting. However to quote some random internet source I just happen to recall, it's "battered, but not broken".
As a good pen tester it's good to know the flaw, how it works, and of course the solution. Thanks for the follow up on that Thorn!
Be very clean . the idea
thanks folks ...