[kismac] Re: what is required to crack WPA?

  • From: <da_eternal_7@xxxxxxxxxxx>
  • To: <kismac@xxxxxxxxxxxxx>
  • Date: Thu, 16 Aug 2007 16:37:01 +0200

From my experience the pre-generated wpa_psk-h1kari_renderman rainbow table works nice unless it's a non standard ssid, it's a 40gb download but worth it. Interesting (short) thread on this: http://forums.remote-exploit.org/archive/index.php/t-7226.html

Imo, you should be reading a ton more before asking questions. But that's just me and i'm a compulsive googler everytime i come across something interesting/new

----- Original Message ----- From: "Javier Bonet" <jabonet@xxxxxxxxxx>
To: <kismac@xxxxxxxxxxxxx>
Sent: Thursday, August 16, 2007 3:55 PM
Subject: [kismac] Re: what is required to crack WPA?

How long could Jacktheripper take to crack WPA?

Is it possible to capture a handshake, how many handshake could you need?


----- Start Original Message -----
Sent: Tue, 14 Aug 2007 20:23:15 -0400
From: adese <adese0@xxxxxxxxx>
To: kismac@xxxxxxxxxxxxx
Subject: [kismac] Re: what is required to crack WPA?

A "handshake" is needed to be captured in order to crack WPA. A
handshake occurs when a client connects to an access point for the
first time. i.e. when they turn their computer on and the computer
autoconnects to the network a handshake packet occurs.

There are only 2 ways to crack this, either by a dictionary attack
using :

aircrack-ng -a 2 -w dictionaryfile capturefile

Or by brute force which requires an app like JohnTheRipper.

For these reasons, WPA is very secure given one uses a non-dictionary


On 14 aug 2007, at 19.59, Javier Bonet wrote:

> What is required to crack WPA WLANs?
> what does the --WPA comands in aircrack-ng.
> J

----- End Original Message -----

Other related posts: