Results 1 to 7 of 7

Thread: pyrit +cowpatty error

  1. #1
    Junior Member
    Join Date
    Feb 2010
    Posts
    27

    Default pyrit +cowpatty error

    root@bt:~# pyrit -e lizdainis_ap -f /pentest/passwords/wordlists/darkc0de.lst passthrough | cowpatty -d - -r lizdainis.cap -s lizdainis_ap
    cowpatty 4.6 - WPA-PSK dictionary attack. <jwright@hasborg.com>

    Collected all necessary data to mount crack against WPA/PSK passphrase.
    Starting dictionary attack. Please be patient.
    Using STDIN for hashfile contents.
    Traceback (most recent call last):
    File "/usr/bin/pyrit", line 6, in <module>
    pyrit_cli.Pyrit_CLI().initFromArgv()
    File "/usr/lib/python2.5/site-packages/pyrit_cli.py", line 63, in initFromArgv
    ['all-handshakes'])
    File "/usr/lib/python2.5/getopt.py", line 91, in getopt
    opts, args = do_shorts(opts, args[0][1:], shortopts, args[1:])
    File "/usr/lib/python2.5/getopt.py", line 191, in do_shorts
    if short_has_arg(opt, shortopts):
    File "/usr/lib/python2.5/getopt.py", line 207, in short_has_arg
    raise GetoptError('option -%s not recognized' % opt, opt)
    getopt.GetoptError: option -f not recognized
    fread: Success
    Unable to identify the PSK from the dictionary file. Try expanding your
    passphrase list, and double-check the SSID. Sorry it didn't work out.

    0 passphrases tested in 0.15 seconds: 0.00 passphrases/second

    what i am doing wrond ?

  2. #2
    Member CKing's Avatar
    Join Date
    Mar 2010
    Location
    downtown, riverfront
    Posts
    83

    Default Re: pyrit +cowpatty error

    Not sure what -f in pyrit is supposed to accomplish, -i is probably what you were looking for. You can also cut cowpatty out of the equation and just run:
    "pyrit -e lizdainis_ap -i /pentest/passwords/wordlists/darkc0de.lst -r izdainis.cap attack_passthrough"

  3. #3
    Junior Member
    Join Date
    Feb 2010
    Posts
    27

    Default Re: pyrit +cowpatty error

    root@bt:~# pyrit -e lizdainis_ap -i /pentest/passwords/wordlists/darkc0de.lst -r lizdainis.cap attack_passthrough
    Pyrit 0.3.1-dev (svn r275) (C) 2008-2010 Lukas Lueg pyrit - Project Hosting on Google Code
    This code is distributed under the GNU General Public License v3+

    Parsing file 'lizdainis.cap' (1/1)...
    Parsed 4 packets (4 802.11-packets), got 1 AP(s)

    Picked AccessPoint 00:22:33:30:08:31 automatically...
    Tried 1148063 PMKs so far; 34472 PMKs per second.

    The password is '*********'.






    root@bt:~# pyrit -e lizdainis_ap -i /pentest/passwords/wordlists/darkc0de.lst -r lizdainis.cap passthrough | cowpatty -d - -r lizdainis.cap -s lizdainis_ap
    cowpatty 4.6 - WPA-PSK dictionary attack. <jwright@hasborg.com>

    Collected all necessary data to mount crack against WPA/PSK passphrase.
    Starting dictionary attack. Please be patient.
    Using STDIN for hashfile contents.
    The command 'passthrough' requires the option '-o'. See 'help'.
    fread: Success
    Unable to identify the PSK from the dictionary file. Try expanding your
    passphrase list, and double-check the SSID. Sorry it didn't work out.

    0 passphrases tested in 0.14 seconds: 0.00 passphrases/second


    why cowpatty not working ?
    Last edited by lizdainis; 01-16-2011 at 11:57 AM.

  4. #4
    Very good friend of the forum Gitsnik's Avatar
    Join Date
    Jan 2010
    Location
    The Crystal Wind
    Posts
    851

    Default Re: pyrit +cowpatty error

    You kind of have to read the error messages for this to be useful to you. Sort of necessary you see.
    Code:
    The command 'passthrough' requires the option '-o'. See 'help'.
    Pretty sure if you look at what you're pasting instead of just trying to crack the protocol, you might start getting somewhere.
    Still not underestimating the power...

    There is no such thing as bad information - There is truth in the data, so you sift it all, even the crap stuff.

  5. #5
    Junior Member
    Join Date
    Feb 2010
    Posts
    27

    Default Re: pyrit +cowpatty error

    sorry for my bad english . i saw error
    what i have to specify with -o ?
    when i specify something i get another error
    pyrit -e lizdainis_ap -o /root/asd -i /pentest/passwords/wordlists/darkc0de.lst passthrough | cowpatty -d - -r lizdainis.cap -s lizdainis_ap
    cowpatty 4.6 - WPA-PSK dictionary attack. <jwright@hasborg.com>

    Collected all necessary data to mount crack against WPA/PSK passphrase.
    Starting dictionary attack. Please be patient.
    Using STDIN for hashfile contents.
    *** buffer overflow detected ***: cowpatty terminated
    ======= Backtrace: =========
    /lib/tls/i686/cmov/libc.so.6(__fortify_fail+0x48)[0xb7d966d8]
    /lib/tls/i686/cmov/libc.so.6[0xb7d94800]
    cowpatty[0x804a914]
    cowpatty[0x804af53]
    /lib/tls/i686/cmov/libc.so.6(__libc_start_main+0xe5)[0xb7cb2685]
    cowpatty[0x8048cb1]
    ======= Memory map: ========
    08048000-0804d000 r-xp 00000000 08:05 145040 /usr/bin/cowpatty
    0804d000-0804e000 r--p 00004000 08:05 145040 /usr/bin/cowpatty
    0804e000-0804f000 rw-p 00005000 08:05 145040 /usr/bin/cowpatty
    085ed000-0860e000 rw-p 00000000 00:00 0 [heap]
    b7c81000-b7c82000 rw-p 00000000 00:00 0
    b7c82000-b7c96000 r-xp 00000000 08:05 153482 /usr/lib/libz.so.1.2.3.3
    b7c96000-b7c98000 rw-p 00013000 08:05 153482 /usr/lib/libz.so.1.2.3.3
    b7c98000-b7c9a000 r-xp 00000000 08:05 15743 /lib/tls/i686/cmov/libdl-2.8.90.so
    b7c9a000-b7c9b000 r--p 00001000 08:05 15743 /lib/tls/i686/cmov/libdl-2.8.90.so
    b7c9b000-b7c9c000 rw-p 00002000 08:05 15743 /lib/tls/i686/cmov/libdl-2.8.90.so
    b7c9c000-b7df4000 r-xp 00000000 08:05 15737 /lib/tls/i686/cmov/libc-2.8.90.so
    b7df4000-b7df6000 r--p 00158000 08:05 15737 /lib/tls/i686/cmov/libc-2.8.90.so
    b7df6000-b7df7000 rw-p 0015a000 08:05 15737 /lib/tls/i686/cmov/libc-2.8.90.so
    b7df7000-b7dfa000 rw-p 00000000 00:00 0
    b7dfa000-b7f2d000 r-xp 00000000 08:05 149241 /usr/lib/i686/cmov/libcrypto.so.0.9.8
    b7f2d000-b7f35000 r--p 00132000 08:05 149241 /usr/lib/i686/cmov/libcrypto.so.0.9.8
    b7f35000-b7f42000 rw-p 0013a000 08:05 149241 /usr/lib/i686/cmov/libcrypto.so.0.9.8
    b7f42000-b7f46000 rw-p 00000000 00:00 0
    b7f46000-b7f77000 r-xp 00000000 08:05 61639 /usr/lib/libpcap.so.1.0.0
    b7f77000-b7f78000 r--p 00031000 08:05 61639 /usr/lib/libpcap.so.1.0.0
    b7f78000-b7f79000 rw-p 00032000 08:05 61639 /usr/lib/libpcap.so.1.0.0
    b7f7d000-b7f8a000 r-xp 00000000 08:05 12604 /lib/libgcc_s.so.1
    b7f8a000-b7f8b000 r--p 0000c000 08:05 12604 /lib/libgcc_s.so.1
    b7f8b000-b7f8c000 rw-p 0000d000 08:05 12604 /lib/libgcc_s.so.1
    b7f8c000-b7f91000 rw-p 00000000 00:00 0
    b7f91000-b7fab000 r-xp 00000000 08:05 12562 /lib/ld-2.8.90.so
    b7fab000-b7fac000 rw-p 00000000 00:00 0
    b7fac000-b7fad000 r--p 0001a000 08:05 12562 /lib/ld-2.8.90.so
    b7fad000-b7fae000 rw-p 0001b000 08:05 12562 /lib/ld-2.8.90.so
    bf8f2000-bf907000 rw-p 00000000 00:00 0 [stack]
    ffffe000-fffff000 r-xp 00000000 00:00 0 [vdso]
    IOError while writing to stdout ignored.
    Aborted

  6. #6
    Member CKing's Avatar
    Join Date
    Mar 2010
    Location
    downtown, riverfront
    Posts
    83

    Default Re: pyrit +cowpatty error

    "pyrit -e lizdainis_ap -o /root/asd -i /pentest/passwords/wordlists/darkc0de.lst passthrough | cowpatty -d - -r lizdainis.cap -s lizdainis_ap"
    is telling pyrit to write the pmks to /root/asd, and then telling cowpatty to read from stdin. If you read the man page, online documentation, or even the short help offered by running pyrit without any commands, you would know that stdout can be specified with '-'. Why are you so determined to use cowpatty anyways? Pyrit does the whole job by itself quite nicely.

  7. #7
    Junior Member
    Join Date
    Feb 2010
    Posts
    27

    Default Re: pyrit +cowpatty error

    thanx evereone every thing is working i needed this
    root@bt:~# pyrit -e lizdainis_ap -o - -i /pentest/passwords/wordlists/darkc0de.lst passthrough | cowpatty -d - -r lizdainis.cap -s lizdainis_ap
    with cowpaty it is faster

Similar Threads

  1. crunch pyrit cowpatty
    By RogerDoger in forum OLD Newbie Area
    Replies: 0
    Last Post: 01-31-2010, 04:40 AM
  2. pyrit passthrough cowpatty
    By manulu in forum OLD BackTrack 4 (pre) Final
    Replies: 2
    Last Post: 11-05-2009, 07:37 PM
  3. How To: Crack WPA fast with graphic cards (using Pyrit + coWPatty)
    By notlist3d in forum OLD BackTrack 4 Howto
    Replies: 5
    Last Post: 10-04-2009, 10:42 PM
  4. info su hash e wpa , pyrit cowpatty etc
    By Nemis in forum Angolo dei Newbie
    Replies: 1
    Last Post: 07-17-2009, 06:59 PM
  5. coWPAtty segmentation fault error
    By michal in forum OLD BT4beta Software Related Issues
    Replies: 7
    Last Post: 05-19-2009, 12:50 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •