Menu
But the three wireless encryptions are WPA and WEP. While WEP is now considered to be insecure, WPA is used in the form of WPA2 by default in routers like the Fritz box. If WPA2 would be hacked, so therefore almost all users would be affected!
Full list of torrents with WPA Rainbow Tables, from Offensive Security.
Each of the following links below are to a .torrent file which enables you to download a Cowpatty WPA Rainbow Table using BitTorrent. All of the tables are SSID specific and use a 49 million WPA optimised password dictionary file. Please take note that each of the tables is 1.9 GB in size.
The password file that was used to generate these lists can be found here.
More info: here
Thanks to our friends of Offensive Security.
Comments
Please enable JavaScript to view the comments powered by Disqus.
Related Articles
Bruteforcers |
|
Password Cracking |
|
Wireless |
|
WPA Rainbow Tables |
aircrack-ng: a 802.11 WEP / WPA-PSK key cracker
Read aircrack-ng man page on Linux:
$ man 1 aircrack-ng
NAME
aircrack-ng - a 802.11 WEP / WPA-PSK key crackerSYNOPSIS
aircrack-ng[options] <.cap / .ivs file(s)>DESCRIPTION
aircrack-ngis an 802.11 WEP and WPA/WPA2-PSK key cracking program.It can recover the WEP key once enough encrypted packets have been captured with airodump-ng. This part of the aircrack-ng suite determines the WEP key using two fundamental methods. The first method is via the PTW approach (Pyshkin, Tews, Weinmann). The main advantage of the PTW approach is that very few data packets are required to crack the WEP key. The second method is the FMS/KoreK method. The FMS/KoreK method incorporates various statistical attacks to discover the WEP key and uses these in combination with brute forcing.
Additionally, the program offers a dictionary method for determining the WEP key. For cracking WPA/WPA2 pre-shared keys, a wordlist (file or stdin) or an airolib-ng has to be used.
OPTIONS
- Static WEP cracking options:
- -c
- Search alpha-numeric characters only.
- -t
- Search binary coded decimal characters only.
- -h
- Search the numeric key for Fritz!BOX
- -d <mask> or --debug <mask>
- Specify mask of the key. For example: A1:XX:CF
- -m <maddr>
- Only keep the IVs coming from packets that match this MAC address. Alternatively, use -m ff:ff:ff:ff:ff:ff to use all and every IVs, regardless of the network (this disables ESSID and BSSID filtering).
- -n <nbits>
- Specify the length of the key: 64 for 40-bit WEP, 128 for 104-bit WEP, etc., until 512 bits of length. The default value is 128.
- -i <index>
- Only keep the IVs that have this key index (1 to 4). The default behaviour is to ignore the key index in the packet, and use the IV regardless.
- -f <fudge>
- By default, this parameter is set to 2. Use a higher value to increase the bruteforce level: cracking will take more time, but with a higher likelihood of success.
- -k <korek>
- There are 17 KoreK attacks. Sometimes one attack creates a huge false positive that prevents the key from being found, even with lots of IVs. Try -k 1, -k 2, ... -k 17 to disable each attack selectively.
- -x or -x0
- Disable last keybytes bruteforce (not advised).
- -x1
- Enable last keybyte bruteforcing (default)
- -x2
- Enable last two keybytes bruteforcing.
- -X
- Disable bruteforce multithreading (SMP only).
- -s
- Shows ASCII version of the key at the right of the screen.
- -y
- This is an experimental single brute-force attack which should only be used when the standard attack mode fails with more than one million IVs.
- -z
- Uses PTW (Andrei Pyshkin, Erik Tews and Ralf-Philipp Weinmann) attack (default attack).
- -P <num> or --ptw-debug <num>
- PTW debug: 1 Disable klein, 2 PTW.
- -K
- Use KoreK attacks instead of PTW.
- -D or --wep-decloak
- WEP decloak mode.
- -1 or --oneshot
- Run only 1 try to crack key with PTW.
- -M <num>
- Specify maximum number of IVs to use.
airserv-ng(8)
airtun-ng(8)
besside-ng(8)
easside-ng(8)
tkiptun-ng(8)
wesside-ng(8)
airdecap-ng(1)
airdecloak-ng(1)
airolib-ng(1)
besside-ng-crawler(1)
buddy-ng(1)
ivstools(1)
kstats(1)
makeivs-ng(1)
packetforge-ng(1)
wpaclean(1)Linux man pages generated by: SysTutorials
![Wpa Wpa](/uploads/1/2/6/2/126291798/130739774.jpg)
Linux Man Pages Copyright Respective Owners. Site Copyright © SysTutorials. All Rights Reserved.