./wip/cowpatty, Designed to audit the security of PSKs selected in WPA networks

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: CURRENT, Version: 4.3, Package name: cowpatty-4.3, Maintainer: pkgsrc-users

WPA-PSK dictionary attack. The PBKDF2 function makes 4096 SHA-1 passes for each
passphrase, which takes quite a bit of time. However, if you are auditing
WPA-PSK or WPA2-PSK networks, you can use this tool to identify weak passphrases
that were used to generate the PMK. Supply a libpcap capture file that includes
the 4-way handshake, a dictionary file of passphrases to guess with, and the
SSID for the network.


Required to run:
[security/openssl]

Required to build:
[pkgtools/cwrappers]

Master sites:

RMD160: 3eff935f1532f84c60bfd576801be4d6911964d1
Filesize: 101.289 KB

Version history: (Expand)


CVS history: (Expand)


   2013-05-24 13:59:58 by othyro | Files touched by this commit (1)
Log message:
Remove pkg-config from USE_TOOLS. Not necessary.
   2013-05-24 13:40:31 by othyro | Files touched by this commit (6)
Log message:
Import cowpatty-4.3 as wip/cowpatty.

WPA-PSK dictionary attack. The PBKDF2 function makes 4096 SHA-1 passes for each
passphrase, which takes quite a bit of time. However, if you are auditing
WPA-PSK or WPA2-PSK networks, you can use this tool to identify weak passphrases
that were used to generate the PMK. Supply a libpcap capture file that includes
the 4-way handshake, a dictionary file of passphrases to guess with, and the
SSID for the network.