cowpatty(1)

Brute-force dictionary attack against WPA-PSK

Section 1 cowpatty bookworm source

Description

COWPATTY

NAME

cowpatty - Brute-force dictionary attack against WPA-PSK

DESCRIPTION

Implementation of an offline dictionary attack against WPA/WPA2 networks using PSK-based authentication (e.g. WPA-Personal)

SYNOPSIS

cowpatty < -d | -r > < HASH-FILE | CAPTURE-FILE > -f WORDLIST -s SSID

OPTIONS

-f

Dictionary file

-d

Hash file (genpmk)

-r

Packet capture file

-s

Network SSID (enclose in quotes if SSID includes spaces)

-c

Check for valid 4-way frames, does not crack

-h

Print this help information and exit

-v

Print verbose information (more -v for more verbosity)

-V

Print program version and exit

AUTHOR

cowpatty was developed Joshua Wright <jwright@hwillhackforsushi.com>.

This manual page was written by Samuel Henrique <samueloph@debian.org> for the Debian project, it was based on cowpatty -h output and can be used by other projects as well.

SEE ALSO

genpmk(1)
aircrack-ng(1)
airodump-ng(1)
airmon-ng(1)
wifite(1)

See Also