Path to this page:
./
wip/cowpatty,
Designed to audit the security of PSKs selected in WPA networks
Branch: CURRENT,
Version: 4.3,
Package name: cowpatty-4.3,
Maintainer: pkgsrc-usersWPA-PSK dictionary attack. The PBKDF2 function makes 4096 SHA-1 passes for each
passphrase, which takes quite a bit of time. However, if you are auditing
WPA-PSK or WPA2-PSK networks, you can use this tool to identify weak passphrases
that were used to generate the PMK. Supply a libpcap capture file that includes
the 4-way handshake, a dictionary file of passphrases to guess with, and the
SSID for the network.
Required to run:[
security/openssl]
Required to build:[
pkgtools/cwrappers]
Master sites:
RMD160: 3eff935f1532f84c60bfd576801be4d6911964d1
Filesize: 101.289 KB
Version history: (Expand)
- (2024-09-19) Package has been reborn
- (2024-09-15) Package deleted from pkgsrc
- (2023-02-13) Package has been reborn
- (2020-09-29) Package has been reborn
- (2020-09-29) Package deleted from pkgsrc
- (2020-01-02) Package has been reborn
CVS history: (Expand)
2013-05-24 13:59:58 by othyro | Files touched by this commit (1) |
Log message:
Remove pkg-config from USE_TOOLS. Not necessary.
|
2013-05-24 13:40:31 by othyro | Files touched by this commit (6) |
Log message:
Import cowpatty-4.3 as wip/cowpatty.
WPA-PSK dictionary attack. The PBKDF2 function makes 4096 SHA-1 passes for each
passphrase, which takes quite a bit of time. However, if you are auditing
WPA-PSK or WPA2-PSK networks, you can use this tool to identify weak passphrases
that were used to generate the PMK. Supply a libpcap capture file that includes
the 4-way handshake, a dictionary file of passphrases to guess with, and the
SSID for the network.
|