Author

Topic: Breaking passwords, WPA/WPA2, dictionary attacks, pyrit, etc (Read 3544 times)

sr. member
Activity: 434
Merit: 250
Not that I would know about war driving, but...   Wink
You can also capture enough traffic to calculate a password. It may take 2gig. of data however. On a little used system that could take a while.
That only works with WEP.
Oh, that's right. Forgot that. TY!
Yeah, WEP is pretty simple especially on a network with at least one user. On a good day, you can crack that in under 5 minutes. With no users on the network it takes a bit longer.

WPA/WPA2 is a whole nother ball game, lol
legendary
Activity: 3066
Merit: 1147
The revolution will be monetized!
Not that I would know about war driving, but...   Wink
You can also capture enough traffic to calculate a password. It may take 2gig. of data however. On a little used system that could take a while.
That only works with WEP.
Oh, that's right. Forgot that. TY!
rjk
sr. member
Activity: 448
Merit: 250
1ngldh
Not that I would know about war driving, but...   Wink
You can also capture enough traffic to calculate a password. It may take 2gig. of data however. On a little used system that could take a while.
That only works with WEP.
legendary
Activity: 3066
Merit: 1147
The revolution will be monetized!
Not that I would know about war driving, but...   Wink
You can also capture enough traffic to calculate a password. It may take 2gig. of data however. On a little used system that could take a while.
rjk
sr. member
Activity: 448
Merit: 250
1ngldh
Interesting. Looks like he's only using 2 gpu's.

What's the difference between rainbow tables, dictionary word list, and precomputed hashes?

Rainbow tables are generated by bruteforcing the hashes and storing them for later. Dictionary word lists are also a table of hashes, but smaller in size due to only including common dictionary words and permutations, not the entire bruteforced keyspace. Precomputed hashes refer to both rainbow tables and dictionary lists.
sr. member
Activity: 434
Merit: 250
Interesting. Looks like he's only using 2 gpu's.

What's the difference between rainbow tables, dictionary word list, and precomputed hashes?
legendary
Activity: 2506
Merit: 1010
Pyrit.

That's what GPUHash.com uses:
 - http://gpuhash.com
sr. member
Activity: 434
Merit: 250
I'm interested in breaking wpa/wpa2 networks. I believe the only real way to do it is to capture the handshake and then try to dictionary attack it for a match. To do that, I'd need pyrit to utilize my dual GPU's.

So, who has used pyrit before? Who has any other background in breaking passwords?
Jump to: