From my experience the pre-generated wpa_psk-h1kari_renderman rainbow table works nice unless it's a non standard ssid, it's a 40gb download but worth it. Interesting (short) thread on this: http://forums.remote-exploit.org/archive/index.php/t-7226.html
Imo, you should be reading a ton more before asking questions. But that's just me and i'm a compulsive googler everytime i come across something interesting/new
----- Original Message ----- From: "Javier Bonet" <jabonet@xxxxxxxxxx>
To: <kismac@xxxxxxxxxxxxx> Sent: Thursday, August 16, 2007 3:55 PM Subject: [kismac] Re: what is required to crack WPA? How long could Jacktheripper take to crack WPA? Is it possible to capture a handshake, how many handshake could you need? J ----- Start Original Message ----- Sent: Tue, 14 Aug 2007 20:23:15 -0400 From: adese <adese0@xxxxxxxxx> To: kismac@xxxxxxxxxxxxx Subject: [kismac] Re: what is required to crack WPA?
A "handshake" is needed to be captured in order to crack WPA. A handshake occurs when a client connects to an access point for the first time. i.e. when they turn their computer on and the computer autoconnects to the network a handshake packet occurs. There are only 2 ways to crack this, either by a dictionary attack using : aircrack-ng -a 2 -w dictionaryfile capturefile Or by brute force which requires an app like JohnTheRipper. For these reasons, WPA is very secure given one uses a non-dictionary password. -adese On 14 aug 2007, at 19.59, Javier Bonet wrote: > What is required to crack WPA WLANs? > > what does the --WPA comands in aircrack-ng. > > J >
----- End Original Message -----