To crack WPA/WPA2 PSK you need to capture a ‘Handshake’ . The best way to this packet the attacker needs to disconnect a connected client currently on the network (if the attacker keeps on repeating this part, it will be a DoS to the user). Once the key packet has been captured, it is time to start an offline dictionary attack. If the network key is in the dictionary, its just a question of waiting to process the dictionary file. From here, the attacker can use that key to decrypt the captured data from before, and now is able to ‘read’ it as well as join the network. If there isn't a connected client - you cant do this. If the network key isn't in the dictionary file - you cant do this. You can speed the the cracking process by creating pre-calculated hash files (see results - for how much faster!).
In this video, g0tmi1k shows us a demo of Aircrack-NG vs coWPAtty. You can read the full blog post here.
Comparing Aircrack-ng versus coWPAtty, in the time it takes to crack a WPA2 PSK key.
It shows 4 different cracks, the time taken and speed of the crack (see results).
> Aircrack-ng (Dictionary)
> Aircrack-ng & airolib-ng (Pre-computed hashes)
> coWPAtty (Dictionary)
> coWPAtty & Genpmk (Pre-computed hashes)
Thanks go out to g0tmi1k for referring this video to us.
Tags: basics ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.