Results 1 to 8 of 8

Thread: Aircrack or Cowpatty for WPA dictionary attacks?

  1. #1
    Member
    Join Date
    May 2007
    Posts
    138

    Default Aircrack or Cowpatty for WPA dictionary attacks?

    I've tried using both Aircrack and Cowpatty to crack WPA with a dictionary attack, and so far my findings suggest that Aircrack is quicker. I find that i get about 36 keys/second from Cowpatty and about 96 keys/second using Aircrack.

    Is there any reason to use Cowpatty instead of Aircrack, except for maybe Rainbow Tables, or are there things i'm just not appreciating about Cowpatty?

  2. #2
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default For -=Prairie Fire=-

    Well...you could just figure it all out yourself using "trial and error" then.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  3. #3
    Developer balding_parrot's Avatar
    Join Date
    May 2007
    Posts
    3,399

    Default

    Quote Originally Posted by -=Xploitz=- View Post
    Well...you could just figure it all out yourself using "trial and error" then.
    That was BAD even for you

  4. #4
    Developer
    Join Date
    Mar 2007
    Posts
    6,124

    Default

    Quote Originally Posted by TrialAndError View Post
    I've tried using both Aircrack and Cowpatty to crack WPA with a dictionary attack, and so far my findings suggest that Aircrack is quicker. I find that i get about 36 keys/second from Cowpatty and about 96 keys/second using Aircrack.

    Is there any reason to use Cowpatty instead of Aircrack, except for maybe Rainbow Tables, or are there things i'm just not appreciating about Cowpatty?
    I like cowpatty because of the rainbow tables. Its all in the size of a mans Dic...............tionary otherwise

  5. #5
    Senior Member PrairieFire's Avatar
    Join Date
    Apr 2007
    Posts
    705

    Default

    Your just using the wrong method:
    Μολὼν λαβέ - Great spirits encounter heavy opposition from mediocre minds.

  6. #6
    Moderator theprez98's Avatar
    Join Date
    Jan 2010
    Location
    Maryland
    Posts
    2,533

    Default

    Quote Originally Posted by TrialAndError View Post
    I've tried using both Aircrack and Cowpatty to crack WPA with a dictionary attack, and so far my findings suggest that Aircrack is quicker. I find that i get about 36 keys/second from Cowpatty and about 96 keys/second using Aircrack.

    Is there any reason to use Cowpatty instead of Aircrack, except for maybe Rainbow Tables, or are there things i'm just not appreciating about Cowpatty?
    I'm glad you asked this question.

    http://forums.remote-exploit.org/showthread.php?t=7384:
    Quote Originally Posted by Summary
    To test 172,779 passphrases at 44.89 passphrases/second would take 64+ minutes. On the other hand, by creating the hash tables ahead of time (approximate time of generation was 30 minutes), I was able to test all 172,779 passphrases in 2.68 seconds. This is an approximate increase of 3+ orders of magnitude!
    "\x74\x68\x65\x70\x72\x65\x7a\x39\x38";

  7. #7
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Talking

    Quote Originally Posted by purehate View Post
    I like cowpatty because of the rainbow tables. Its all in the size of a mans Dic...............tionary otherwise
    LMFAO!! .............He said dic.............tionary

    They always told me that it wasn't the size of your dic........tionary....that it was really about the way and how you use your dic..........tionary. And I've been told that a lot by many women....I mean by bruteforcers.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  8. #8
    Member
    Join Date
    May 2007
    Posts
    138

    Default

    Thanks prez, that summed it up perfectly

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •