Results 1 to 2 of 2

Thread: Pyrit error cuda

  1. #1
    Just burned his ISO
    Join Date
    Jan 2010
    Posts
    7

    Default Pyrit error cuda

    Hi!

    When I run the following command:
    pyrit -e test1 -f /pentest/passwords/wordlists/wordlist.lst passthrough | /pentest/wireless/cowpatty/cowpatty -d - -s test1 -r wpa.cap

    I get the following error:



    cowpatty 4.6 - WPA-PSK dictionary attack. <jwright@hasborg.com>

    Collected all necessary data to mount crack against WPA2/PSK passphrase.
    Starting dictionary attack. Please be patient.
    Using STDIN for hashfile contents.
    Traceback (most recent call last):
    File "/usr/bin/pyrit", line 6, in <module>
    pyrit_cli.Pyrit_CLI().initFromArgv()
    File "/usr/lib/python2.5/site-packages/pyrit_cli.py", line 62, in initFromArgv
    args, commands = getopt.getopt(sys.argv[1:], 'u:v:c:e:i:r:b:')
    File "/usr/lib/python2.5/getopt.py", line 91, in getopt
    opts, args = do_shorts(opts, args[0][1:], shortopts, args[1:])
    File "/usr/lib/python2.5/getopt.py", line 191, in do_shorts
    if short_has_arg(opt, shortopts):
    File "/usr/lib/python2.5/getopt.py", line 207, in short_has_arg
    raise GetoptError('option -%s not recognized' % opt, opt)
    getopt.GetoptError: option -f not recognized
    fread: Success
    Unable to identify the PSK from the dictionary file. Try expanding your
    passphrase list, and double-check the SSID. Sorry it didn't work out.

    0 passphrases tested in 0.23 seconds: 0.00 passphrases/second



    I have run a selftest og Pyrit and all is ok. I've also tried to replace the "-f" with "i" or "o" without any succes. It gives me the following error:



    cowpatty 4.6 - WPA-PSK dictionary attack. <jwright@hasborg.com>

    Collected all necessary data to mount crack against WPA2/PSK passphrase.
    Starting dictionary attack. Please be patient.
    Using STDIN for hashfile contents.
    The command 'passthrough' requires the option '-i'. See 'help'.
    fread: Success
    Unable to identify the PSK from the dictionary file. Try expanding your
    passphrase list, and double-check the SSID. Sorry it didn't work out.


    cowpatty 4.6 - WPA-PSK dictionary attack. <jwright@hasborg.com>



    And vice versa:



    Collected all necessary data to mount crack against WPA2/PSK passphrase.
    Starting dictionary attack. Please be patient.
    Using STDIN for hashfile contents.
    The command 'passthrough' requires the option '-o'. See 'help'.
    fread: Success
    Unable to identify the PSK from the dictionary file. Try expanding your
    passphrase list, and double-check the SSID. Sorry it didn't work out.


    Very thankful for help!

  2. #2
    Just burned his ISO
    Join Date
    Jan 2010
    Posts
    18

    Default

    you need to specify an input and output for pyrit now....

    Code:
    pyrit -e test1 -i /pentest/passwords/wordlists/wordlist.lst -o -  passthrough | /pentest/wireless/cowpatty/cowpatty -d - -s test1 -r wpa.cap
    So for pyrit make sure to specify -i, your input file, and -o -, your ouptut file, make sure to use "-" for stdout. The pyrit / CUDA guide posted by pureh@te is slightly out dated because of updates they've made to the programs, -f is no longer a valid option for pyrit

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •