For this demo, I will be using BackTrack. Step 2: Find the Cowpatty Help Screen To get a brief rundown of the cowpatty options, simply type: cowpatty BackTrack will provide you a brief help screen. Take a note that cowpatty requires all of the following: a word list a file where the password hash has been captured the SSID of the target AP Step 3: Find the AP Just as in cracking with aircrack-ng, we need to put the wireless adapter into monitor mode. Some people just wait for a computer to connect. Other people send DEAUTH packets to kick them off the wifi, and then they automatically connect again, at which time you will capture the handshake.
|Country:||Bosnia & Herzegovina|
|Published (Last):||11 September 2014|
|PDF File Size:||19.75 Mb|
|ePub File Size:||6.28 Mb|
|Price:||Free* [*Free Regsitration Required]|
WonderHowTo Welcome, my hacker novitiates! In my last post, we cracked WPA2 using aircrack-ng. Need a wireless network adapter? Check out our list of Kali Linux and Backtrack compatible wireless network adapters in the link above, or you can grab our most popular adapter for beginners here. Step 1: Find Cowpatty Cowpatty is one of the hundreds of pieces of software that are included in the BackTrack suite of software. Step 2: Find the Cowpatty Help Screen To get a brief rundown of the cowpatty options, simply type: cowpatty BackTrack will provide you a brief help screen.
Take a note that cowpatty requires all of the following. Step 6: Run the Cowpatty Now that we have the hash of the password, we can use it with cowpatty and our wordlist to crack the hash.
When the hashes match, it dsplays the password of the AP. This means that the same password on different SSIDs will generate different hashes. This prevents us from simply using a rainbow table against all APs. Cowpatty must take the password list you provide and compute the hash with the SSID for each word. This is very CPU intensive and slow.
Cowpatty now supports using a pre-computed hash file rather than a plain-text word file, making the cracking of the WPA2-PSK password x faster! Pre-computed hash files are available from the Church of WiFi , and these pre-computed hash files are generated using , dictionary file and the 1, most popular SSIDs. In that case, we need to generate our own hashes for our target SSID.
We can do this by using an application called genpmk. Get started using Cowpatty with the Raspberry Pi. Check them out here. If you have questions on any of this, please ask them in the comments below.
Want to start making money as a white hat hacker? Subscribe Now.
How To Hack: Cracking Wifi Passwords with Cowpatty (WPA2)