![]() there are a LOT of rainbow tables with default SSID's by manufactures. The way that Cowpatty works, is that it tries to match this combination with multiple passphrases from a password list "Provided by you". you can put an X (a variable) in the place of passphrase. Since we know the SSID/Salt and you have the 4-way handshake (WPA Key). The way this works is like this (SSID aka "Salt" + passphrase = WPA key) Now that you have a pcap of the 4-way handshake between the device and AP, you can use a program called "Cowpatty" to find the key/passphrase. I'm not responsible in ANYWAY with what you use this information for. I give you these tools and instructions ONLY for the sole purpose that you are learning/testing on equipment that you own and have administrative rights/ the authority to do so. If you're doing pen-testing on your own network to figure out just how secure it is. I'm not quite sure what you're trying to obtain here.
0 Comments
Leave a Reply. |