cowpatty(1)
Brute-force dictionary attack against WPA-PSK
Description
COWPATTY
NAME
cowpatty - Brute-force dictionary attack against WPA-PSK
DESCRIPTION
Implementation of an offline dictionary attack against WPA/WPA2 networks using PSK-based authentication (e.g. WPA-Personal)
SYNOPSIS
cowpatty < -d | -r > < HASH-FILE | CAPTURE-FILE > -f WORDLIST -s SSID
OPTIONS
|
-f |
Dictionary file |
|||
|
-d |
Hash file (genpmk) |
|||
|
-r |
Packet capture file |
|||
|
-s |
Network SSID (enclose in quotes if SSID includes spaces) |
|||
|
-c |
Check for valid 4-way frames, does not crack |
|||
|
-h |
Print this help information and exit |
|||
|
-v |
Print verbose information (more -v for more verbosity) |
|||
|
-V |
Print program version and exit |
AUTHOR
cowpatty was developed Joshua Wright <jwright@hwillhackforsushi.com>.
This manual page was written by Samuel Henrique <samueloph@debian.org> for the Debian project, it was based on cowpatty -h output and can be used by other projects as well.
SEE ALSO
genpmk(1)
aircrack-ng(1)
airodump-ng(1)
airmon-ng(1)
wifite(1)
See Also
- genpmk(1)
- aircrack-ng(1)
- airodump-ng(1)
- airmon-ng(1)
- wifite(1)