bookmarks  2

  •  

    An Introduction WPA Cracker is a cloud cracking service for penetration testers and network auditors who need to check the security of WPA-PSK protected wireless networks. WPA-PSK networks are vulnerable to dictionary attacks, but running a respectable-sized dictionary over a WPA network handshake can take days or weeks. WPA Cracker gives you access to a 400CPU cluster that will run your network capture against a 135 million word dictionary created specifically for WPA passwords. While this job would take over 5 days on a contemporary dual-core PC, on our cluster it takes an average of 20 minutes, for only $17. NEW :: We now offer Germany dictionary support, a 284 million word extended English dictionary option, and ZIP file cracking.
    13 years ago by @draganigajic
    (0)
     
     
  •  

    Our previous work on WPA-PSK lookup tables incorporated ~172,000 word dictionary. While impressive, it didn't cover a very large part of the key space. The password selection was a bit on the crude side (whatever we could find to make up 172,000 words!). After the initial success we found with this set of tables, we decided to figure out a more optimal set of tables. This set, comprising the same 1000 SSID list incorporates a password list compiled from contributions from RenderMan, Mark Burnett and Kevin Mitnick. The resulting list is ~1,000,000 words for a total of approximately 40GB of hash tables for the top 1000 SSID's. H1kari of OpenCiphers.org collaborated his work on FPGA arrays to offer up some extreme computing power to crunch these numbers. His super awesome contribution of time on 15 FPGA arrays allowed us to compute these tables in a record 3 days. He made some small changes to coWPAtty for FPGA support and are available at openciphers.org in the downloads area.
    13 years ago by @draganigajic
    (0)
     
     
  • ⟨⟨
  • 1
  • ⟩⟩

publications  

    No matching posts.
  • ⟨⟨
  • ⟩⟩