Results 1 to 9 of 9

Thread: WPA-PSK Cracking Without Wireless Clients

  1. #1
    Join Date
    2013-Mar
    Location
    http://rastamouse.me
    Posts
    86

    WPA-PSK Cracking Without Wireless Clients

    I keep seeing time and time again, people asking on various forums whether or not cracking WPA without a wireless client was possible. It pained me to see the majority of responses indicated that it was not possible; so I decided to write a PoC that would demonstrate that it was possible (although not exactly practical). My motivation was based around the fact the information getting posted, wasn't exactly accurate. Possible? Yes. But not easy.

    I'm not posting it here to get on a high horse or anything, just for those who may be interested.

    The current script is a simple bash wrapper around the wpa_supplicant and wpa_cli tools, which I smashed together in an evening. I'm sure a much more efficient tool could be created, perhaps based on pylorcon2. But that's for another day

    http://wi-fu.co.uk/wi-fi/wpa-attacks...reless-clients
    OSCP
    --
    If it smells like a duck, walks like a duck and quacks like a duck; then it probably is a duck.

  2. #2
    Join Date
    2013-Mar
    Location
    milano
    Posts
    301
    hi
    thanks for share!!!!and the site is really interesting and well done!!!
    i'm testing on MY WPA2-TKIP ..&&&..PASSED!!!
    http://www.imagestime.com/show.php/9...ttura.PNG.html
    thanks-again +1

  3. #3
    Join Date
    2014-Apr
    Posts
    4
    Thanks for share.

  4. #4
    Join Date
    2014-Apr
    Posts
    2
    This do handshake? Or this crack epa password no handshake?

  5. #5
    Join Date
    2013-Mar
    Location
    http://rastamouse.me
    Posts
    86
    This script does not collect or crack a handshake. It tries to associate directly with an access point.
    OSCP
    --
    If it smells like a duck, walks like a duck and quacks like a duck; then it probably is a duck.

  6. #6
    Join Date
    2014-Apr
    Posts
    1
    This is with a Dic file... Isn't it possible with brute-force given a pass mask or so?

  7. #7
    Join Date
    2013-Mar
    Location
    http://rastamouse.me
    Posts
    86
    What do you mean by pass mask?
    OSCP
    --
    If it smells like a duck, walks like a duck and quacks like a duck; then it probably is a duck.

  8. #8
    Join Date
    2015-Nov
    Posts
    1

    Link down re-post please!

    Link down re-post please!

  9. #9
    Join Date
    2015-Oct
    Posts
    16
    Quote Originally Posted by h4x0r_crew View Post
    Link down re-post please!
    I think this is the script used :-)
    https://github.com/rasta-mouse/Mjoln...ter/mjolnir.sh
    Last edited by nexusnexus; 2015-11-17 at 10:15.

Similar Threads

  1. Cracking a WPA/WPA2 wireless Access Point
    By MrShingles in forum How-To Archive
    Replies: 26
    Last Post: 2015-06-02, 20:44
  2. cracking 5gHz wireless with airodump-ng
    By chpwned in forum General Archive
    Replies: 5
    Last Post: 2013-11-26, 20:53

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •