Brute-force dictionary attack against WPA-PSK
Implementation of an offline dictionary attack against WPA/WPA2 networks using PSK-based authentication (e.g. WPA-Personal). Many enterprise networks deploy PSK-based authentication mechanisms for WPA/WPA2 since it is much easier than establishing the necessary RADIUS, supplicant and certificate authority architecture needed for WPA-Enterprise authentication. Cowpatty can implement an accelerated attack if a precomputed PMK file is available for the SSID that is being assessed.
- Links to home:kolbma / cowpatty
- Has a link diff
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout home:mnhauke/cowpatty && cd $_
- Create Badge
Refresh
Refresh
Source Files (show unmerged sources)
Filename | Size | Changed |
---|---|---|
cowpatty-4.8.tar.gz | 0000097449 95.2 KB | |
cowpatty-github-0a27497.patch | 0000016288 15.9 KB | |
cowpatty.changes | 0000001152 1.13 KB | |
cowpatty.spec | 0000001728 1.69 KB |
Latest Revision
buildservice-autocommit
accepted
request 914398
from
Martin Hauke (mnhauke)
(revision 3)
auto commit by copy to link target
Comments 0