Directory
1, Cdlinux use MINIDWEPGTK to get the handshake package and use the own dictionary to crack
2, with the dictionary to crack the password when the use of the USB stick external dictionary to continue the brute force password
3. Copy the handshake package to the Windows system and use the EWSA tool to crack the password at high speed
4, cracked WPA Encryption "handshake package" dictionary production
First, cdlinux use MINIDWEPGTK to get the handshake package and use the own dictionary hack
Plug the network card, click on the minidwep-gtk above the right mouse button select execution.
Click OK to jump out of the warning dialog box.
The Settings window appears after you click OK
Change the encryption mode to "WPA/WPA2" and then click "Scan".
Scan to a WPA2 signal and have a wireless client online.
Click "Start" to start attacking the wireless client .....
If no client is online, clicking on the "Start" program will enter the state of waiting for the client to continue the attack.
In the attack ........ .........
The attack to the client line is automatically connected to the "handshake package" can be obtained.
Jump out of the screen is to get the "handshake package", select YES at the point OK to enter the dictionary selection interface.
Wordlist.txt is the tool comes with the dictionary, choose after the click OK to start brute force password.
Brute force password ........ .............
The length of time is related to the size of the dictionary and the correct password in the dictionary.
Your own dictionary has not found the password, click OK to enter the next step.
Tip Copy the handshake package to the hard disk.
Second, use a USB stick external dictionary to continue the brute force password
Tips for turning off the copy handshake package
Insert the USB drive, Cdlinux automatically open the root directory on the USB flash drive. Close the file manager of the USB drive.
If it is a virtual machine boot to load the USB drive in the "virtual machine → removable device" and choose to install the USB driver automatically
Click "Run Dictionary" when you're ready.
The interface to select the handshake package is the handshake package we caught first.
Click the file System and enter the TMP folder
00:0f:b5:e9:88:54handshake.cap is the handshake bag we caught first.
Choose him at the point OK
Tip Find a "handshake package", click "Handshake Package" and click OK
Jump out of the dictionary selection interface: Select the dictionary on the USB drive to click Disk, select the dictionary on the CD to choose Cdlinux
I'm going to point disk here. Select a dictionary and click OK to start the brute force
In the violence ....... .............
The speed of the crack is directly related to the size of the dictionary, so long as the correct password exists in the dictionary, it must be cracked.
Look at the code, WPA KEY: The next 19700101 is the password.
C. Copy the handshake package to the Windows system using the EWSA tool to crack the password at high speed
Close all the Windows back to the desktop, click Home to open the file Manager.
Click the "File System →tmp folder" to enter the "handshake package" directory.
Right-click on the "Handshake Package" button and select "Rename"
Because this file name is not allowed under the Windows system, it will not be possible to copy it to the USB flash drive.
Rename with the cracked signal name, note. Cap cannot be changed.
Right-click the "Send To →u" button on the "handshake package" to change your name.
Click on the desktop's USB icon to see if the save is successful
Start EWSA and set to Chinese
Point import data → import AP target data file
Select the "handshake package" point that you just copied from the USB flash drive to open it.
Open the "Handshake package" and click OK.
Click options → new dictionary option
Add a dictionary can also be a multi-dictionary after click OK
Select the "handshake package" to brute force and point to start the attack
Being in the middle of a violent hack ..... .....
The password is coming up ... oh, it's a secret.
My broken computer graphics card is not supported by the software just pure CPU running speed is fast, if it is 4 core CPU plus a good
The speed of the video card running dictionary can reach more than 10,000.
ElcomSoft Wireless Security Auditor
ElcomSoft is a Russian software company, has produced a lot of password cracking software, involving Office, SQL, PDF, EFS and so on. Recently ElcomSoft launched the "Wireless Security Auditor", claiming to be able to use the GPU's computational performance to quickly break the wireless network password, computing speed compared to the use of CPU can be increased up to a hundredfold. The software works very simply by using a dictionary to brute-force the WPA and WPA2 passwords on wireless APs, as well as 12 variable settings such as letter case, digital substitution, symbolic order transformation, abbreviation, vowel replacement, and can be used on both ATI and NVIDIA graphics cards.
It also helps system administrators monitor wireless network security by attempting to restore the WPA/WPA2 PSK initial password that encrypts the WiFi traffic. The ElcomSoft Wireless security Auditor has become one of the fastest and most cost-effective WiFi password recovery and wireless security monitoring tools on the market by leveraging the hardware acceleration technology provided by ATI and NVIDIA, the two major graphics card manufacturers.
The popular point is to use the EWSA load "handshake package" and through the computer's CPU and GPU to run the dictionary quickly complete the brute force
Iv. cracking WPA Encryption "handshake package" dictionary production
According to the above practice, we can see that the WPA encryption as long as there is a reasonable dictionary can be broken quickly, so we just according to the characteristics of Chinese people to generate a targeted dictionary on it!
1, generally have a common weak password such as 1234567890 and commonly used English words
2, Birthday password is also the most use of the password
3, in is the mobile phone number and the landline number to do the password (according to the local phone number segment generation) mobile number segment query: http://mobile.tool.la/sheng/
3 Useful dictionary generation tools available for everyone
Source: http://wenku.baidu.com/view/13e9a9cd02d276a201292e22.html
Replace bottle MINIDWEP-GTK break WPA all Raiders