Results 1 to 3 of 3

Thread: Piping possible passphrases to brute force, turning off computer, then resuming pipe

  1. #1
    Join Date
    2013-Oct
    Posts
    2

    Piping possible passphrases to brute force, turning off computer, then resuming pipe

    Hi, as speed is not the main factor here I'd like to do a brute force attack against a WPA handshake that may take a relatively long time. Initially I was looking into using crunch to create wordlists of a manageable size then feeding each wordlist into pyrit (or aircrack etc.) but creating the wordlists then using pyrit is effectively doubling the workload. (OK not quite but you see where I'm going here)

    Is it possible to pipe the output from crunch to pyrit AND pause the progress or turn off the computer then pick up where I left off?

    I know it's possible to pipe crunch to pyrit, I want to be able to stop and start the same attack as I please from the point I left off.

    Thanks in advance...

  2. #2
    does pyrit shows the key that it is trying, or at least the last key tryed?

  3. #3
    Join Date
    2013-Oct
    Posts
    321
    Is this what you're looking for:

    crunch 10 10 abcdef23456789 -s aaaaaaaaaa | pyrit -e BTHub3-1234 -i - -o - passthrough | cowpatty -d - -r '/root/Desktop/sniff_dump-04.cap' -s BTHub3-1234

    Press Ctrl+c on the keyboard to end the task, crunch will then tell you the string it ended on.
    To resume the task at any point, change "-s aaaaaaaaaa" to whatever crunch ended on.

Similar Threads

  1. brute force problms
    By MIGUELpujol in forum TroubleShooting Archive
    Replies: 1
    Last Post: 2023-01-14, 01:41
  2. Brute Force question
    By ipv89 in forum General Archive
    Replies: 0
    Last Post: 2020-07-26, 22:59
  3. Brute Force vs. Dictionary
    By Kalinoob in forum General Archive
    Replies: 6
    Last Post: 2014-01-05, 15:45

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •