Page 2 of 2 FirstFirst 12
Results 11 to 12 of 12

Thread: Cowpatty Output

  1. #11
    Very good friend of the forum Gitsnik's Avatar
    Join Date
    Jan 2010
    Location
    The Crystal Wind
    Posts
    851

    Default

    Still not underestimating the power...

    There is no such thing as bad information - There is truth in the data, so you sift it all, even the crap stuff.

  2. #12
    Just burned his ISO
    Join Date
    Jan 2010
    Posts
    7

    Default Cowpatty Output

    Hello. Very interested in this topic, but I did not come out.
    I'm trying to install: ./crunch 8 8 ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwx z1234567890 | cowpatty -f - -s ssid -r /root/.gerix-wifi-cracker/sniff_dump-01.cap
    get answer:
    bash: ./crunch: No such file or directory
    cowpatty 4.6 - WPA-PSK dictionary attack. <jwright@hasborg.com>

    Collected all necessary data to mount crack against WPA2/PSK passphrase.
    Starting dictionary attack. Please be patient.
    Using STDIN for words.
    Unable to identify the PSK from the dictionary file. Try expanding your
    passphrase list, and double-check the SSID. Sorry it didn't work out.

    0 passphrases tested in 0.00 seconds: 0.00 passphrases/second

    If you can, help that I did not do so.
    P.S.
    Sorry for my English, I write through the translator


    The solution is found

    Remote Exploit Forums > Specialist Topics > Wireless > Matching password WPA-WPA2 without a dictionary

Page 2 of 2 FirstFirst 12

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •