Replace bottle MINIDWEP-GTK break WPA all Raiders

Source: Internet
Author: User
Tags gtk tmp folder elcomsoft

Directory

1, Cdlinux use MINIDWEPGTK to get the handshake package and use the own dictionary to crack

2, with the dictionary to crack the password when the use of the USB stick external dictionary to continue the brute force password

3. Copy the handshake package to the Windows system and use the EWSA tool to crack the password at high speed

4, cracked WPA Encryption "handshake package" dictionary production

First, cdlinux use MINIDWEPGTK to get the handshake package and use the own dictionary hack

Plug the network card, click on the minidwep-gtk above the right mouse button select execution.

Click OK to jump out of the warning dialog box.

The Settings window appears after you click OK

Change the encryption mode to "WPA/WPA2" and then click "Scan".

Scan to a WPA2 signal and have a wireless client online.

Click "Start" to start attacking the wireless client .....

If no client is online, clicking on the "Start" program will enter the state of waiting for the client to continue the attack.

In the attack ........ .........

The attack to the client line is automatically connected to the "handshake package" can be obtained.

Jump out of the screen is to get the "handshake package", select YES at the point OK to enter the dictionary selection interface.

Wordlist.txt is the tool comes with the dictionary, choose after the click OK to start brute force password.

Brute force password ........ .............

The length of time is related to the size of the dictionary and the correct password in the dictionary.

Your own dictionary has not found the password, click OK to enter the next step.

Tip Copy the handshake package to the hard disk.

Second, use a USB stick external dictionary to continue the brute force password

Tips for turning off the copy handshake package

Insert the USB drive, Cdlinux automatically open the root directory on the USB flash drive. Close the file manager of the USB drive.

If it is a virtual machine boot to load the USB drive in the "virtual machine → removable device" and choose to install the USB driver automatically

Click "Run Dictionary" when you're ready.

The interface to select the handshake package is the handshake package we caught first.

Click the file System and enter the TMP folder

00:0f:b5:e9:88:54handshake.cap is the handshake bag we caught first.

Choose him at the point OK

Tip Find a "handshake package", click "Handshake Package" and click OK

Jump out of the dictionary selection interface: Select the dictionary on the USB drive to click Disk, select the dictionary on the CD to choose Cdlinux

I'm going to point disk here. Select a dictionary and click OK to start the brute force

In the violence ....... .............

The speed of the crack is directly related to the size of the dictionary, so long as the correct password exists in the dictionary, it must be cracked.

Look at the code, WPA KEY: The next 19700101 is the password.

C. Copy the handshake package to the Windows system using the EWSA tool to crack the password at high speed

Close all the Windows back to the desktop, click Home to open the file Manager.

Click the "File System →tmp folder" to enter the "handshake package" directory.

Right-click on the "Handshake Package" button and select "Rename"

Because this file name is not allowed under the Windows system, it will not be possible to copy it to the USB flash drive.

Rename with the cracked signal name, note. Cap cannot be changed.

Right-click the "Send To →u" button on the "handshake package" to change your name.

Click on the desktop's USB icon to see if the save is successful

Start EWSA and set to Chinese

Point import data → import AP target data file

Select the "handshake package" point that you just copied from the USB flash drive to open it.

Open the "Handshake package" and click OK.

Click options → new dictionary option

Add a dictionary can also be a multi-dictionary after click OK

Select the "handshake package" to brute force and point to start the attack

Being in the middle of a violent hack ..... .....

The password is coming up ... oh, it's a secret.

My broken computer graphics card is not supported by the software just pure CPU running speed is fast, if it is 4 core CPU plus a good

The speed of the video card running dictionary can reach more than 10,000.

ElcomSoft Wireless Security Auditor

ElcomSoft is a Russian software company, has produced a lot of password cracking software, involving Office, SQL, PDF, EFS and so on. Recently ElcomSoft launched the "Wireless Security Auditor", claiming to be able to use the GPU's computational performance to quickly break the wireless network password, computing speed compared to the use of CPU can be increased up to a hundredfold. The software works very simply by using a dictionary to brute-force the WPA and WPA2 passwords on wireless APs, as well as 12 variable settings such as letter case, digital substitution, symbolic order transformation, abbreviation, vowel replacement, and can be used on both ATI and NVIDIA graphics cards.

It also helps system administrators monitor wireless network security by attempting to restore the WPA/WPA2 PSK initial password that encrypts the WiFi traffic. The ElcomSoft Wireless security Auditor has become one of the fastest and most cost-effective WiFi password recovery and wireless security monitoring tools on the market by leveraging the hardware acceleration technology provided by ATI and NVIDIA, the two major graphics card manufacturers.

The popular point is to use the EWSA load "handshake package" and through the computer's CPU and GPU to run the dictionary quickly complete the brute force

Iv. cracking WPA Encryption "handshake package" dictionary production

According to the above practice, we can see that the WPA encryption as long as there is a reasonable dictionary can be broken quickly, so we just according to the characteristics of Chinese people to generate a targeted dictionary on it!

1, generally have a common weak password such as 1234567890 and commonly used English words

2, Birthday password is also the most use of the password

3, in is the mobile phone number and the landline number to do the password (according to the local phone number segment generation) mobile number segment query: http://mobile.tool.la/sheng/

3 Useful dictionary generation tools available for everyone

Source: http://wenku.baidu.com/view/13e9a9cd02d276a201292e22.html

Replace bottle MINIDWEP-GTK break WPA all Raiders

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.