Page 2 of 2 FirstFirst 12
Results 11 to 12 of 12

Thread: Cowpatty Output

  1. #11
    Very good friend of the forum Gitsnik's Avatar
    Join Date
    Jan 2010
    The Crystal Wind


    Still not underestimating the power...

    There is no such thing as bad information - There is truth in the data, so you sift it all, even the crap stuff.

  2. #12
    Just burned his ISO
    Join Date
    Jan 2010

    Default Cowpatty Output

    Hello. Very interested in this topic, but I did not come out.
    I'm trying to install: ./crunch 8 8 ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwx z1234567890 | cowpatty -f - -s ssid -r /root/.gerix-wifi-cracker/sniff_dump-01.cap
    get answer:
    bash: ./crunch: No such file or directory
    cowpatty 4.6 - WPA-PSK dictionary attack. <>

    Collected all necessary data to mount crack against WPA2/PSK passphrase.
    Starting dictionary attack. Please be patient.
    Using STDIN for words.
    Unable to identify the PSK from the dictionary file. Try expanding your
    passphrase list, and double-check the SSID. Sorry it didn't work out.

    0 passphrases tested in 0.00 seconds: 0.00 passphrases/second

    If you can, help that I did not do so.
    Sorry for my English, I write through the translator

    The solution is found

    Remote Exploit Forums > Specialist Topics > Wireless > Matching password WPA-WPA2 without a dictionary

Page 2 of 2 FirstFirst 12

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts