can you look at this please?
http://www.exploresecurity.com/willi...action-script/
I will try it.
very interesting:
Code:
root@kali:~# cd /root && ./william.sh Xxxx222.cap Xxxx11.cap
Mode=REVERSE m=1 (second message) n=1 (first message) ignoring duplicates
Using packet 4 as second EAPOL packet
BSSID is 38:60:77:xx:xx:xx
TKIP network identified
Client station is 94:eb:cd:xx:xx:xx
Determined SSID from beacon frame (packet number 1)
The SSID is XXXXXX
There are 1 first messages before the chosen second message
Using packet 2 as first EAPOL packet
Writing packets to Xxxx222.cap
Deleting temp files
Now run "aircrack-ng Xxxx222.cap -w <dictionary_file>"
root@kali:~# pyrit -r Xxxx222.cap analyze
ERROR: could not insert 'nvidia': No such device
Pyrit 0.4.1-dev (svn r308) (C) 2008-2011 Lukas Lueg http://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3+
Parsing file 'Xxxx222.cap' (1/1)...
Parsed 3 packets (3 802.11-packets), got 1 AP(s)
#1: AccessPoint 38:60:77:xx:xx:xx ('XXXXXX'):
#1: Station 94:eb:cd:xx:xx:xx, 1 handshake(s):
#1: HMAC_MD5_RC4, bad, spread 1
root@kali:~# cowpatty -r Xxxx222.cap -c
cowpatty 4.6 - WPA-PSK dictionary attack. <[email protected]>
Collected all necessary data to mount crack against WPA/PSK passphrase.
root@kali:~#
now pyrit and cowpatty don't agree on the output.cap file generated by william.