Brute-force dictionary attack against WPA-PSK
Implementation of an offline dictionary attack against WPA/WPA2 networks using PSK-based authentication (e.g. WPA-Personal). Many enterprise networks deploy PSK-based authentication mechanisms for WPA/WPA2 since it is much easier than establishing the necessary RADIUS, supplicant and certificate authority architecture needed for WPA-Enterprise authentication. Cowpatty can implement an accelerated attack if a precomputed PMK file is available for the SSID that is being assessed.
-
1
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout home:kolbma/cowpatty && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
cowpatty-4.8.tar.gz | 0000097449 95.2 KB | |
cowpatty-github-0a27497.patch | 0000016288 15.9 KB | |
cowpatty.changes | 0000001152 1.13 KB | |
cowpatty.spec | 0000001728 1.69 KB |
Latest Revision
Markus Kolb (kolbma)
committed
(revision 7)
- Removed cowpatty-Makefile.patch * Merged in cowpatty-github-0a27497.patch
Comments 0