Results 1 to 3 of 3

Thread: quick question about cowpatty's genpmk.

Hybrid View

  1. #1
    Just burned his ISO
    Join Date
    Mar 2009
    Posts
    12

    Default

    does this action crate a rainbow table out of a dictionary file? or does it create wpa chains using ABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789?

    if it creates a wpa rainbow table using a dictionary file that you would use to do a dictionary attack? i probably wouldn't want to use this file unless its the only way.

    if so is there a program like rtgen which creates LM and WD5 password chains which also creates wpa rainbow tables?

    or is it possible to create a wpa rainbow table with rtgen using a specific essid?

    and yes i know google is my friend... trust me i do look up these questions first.

    ok i obviously didn't look hard enought. i just found and read this forum forums.remote-exploit.xxx/showthread.php?t=17850

    really i get that lookup tables (not rainbow tables) help speed things up. i just don't understand why you can't use the same LM chain concept on WPA.

    so my next question is where can i find a strong dictionary. i've been trying to find one for some time now and google gives me nothing.

  2. #2
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Talking

    Quote Originally Posted by Doomsday51225 View Post
    ok i obviously didn't look hard enought. .......

    so my next question is where can i find a strong dictionary. i've been trying to find one for some time now and google gives me nothing.
    Obviously you still haven't looked hard enough.

    Myself and purehate along with other members of this forum have made our wordlist complications public for people like you to have.

    Try putting in the forums search box>>>>

    Code:
    wordlist
    And I bet the very first search result yielded is a good one from a great guy.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  3. #3
    Just burned his ISO
    Join Date
    Mar 2009
    Posts
    12

    Default

    lol this was the first thread to come up when i typed it in.

    thanks for the help xploitz.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •