Bitcoin Forum
April 23, 2018, 08:09:20 AM *
News: Latest stable version of Bitcoin Core: 0.16.0  [Torrent]. (New!)
 
   Home   Help Search Donate Login Register  
Pages: [1]
  Print  
Author Topic: Breaking passwords, WPA/WPA2, dictionary attacks, pyrit, etc  (Read 3459 times)
pandemic
Sr. Member
****
Offline Offline

Activity: 431
Merit: 250


View Profile
May 01, 2012, 04:22:38 AM
 #1

I'm interested in breaking wpa/wpa2 networks. I believe the only real way to do it is to capture the handshake and then try to dictionary attack it for a match. To do that, I'd need pyrit to utilize my dual GPU's.

So, who has used pyrit before? Who has any other background in breaking passwords?
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1524470960
Hero Member
*
Offline Offline

Posts: 1524470960

View Profile Personal Message (Offline)

Ignore
1524470960
Reply with quote  #2

1524470960
Report to moderator
Stephen Gornick
Legendary
*
Offline Offline

Activity: 2478
Merit: 1000


View Profile
May 01, 2012, 11:13:42 PM
 #2

Pyrit.

That's what GPUHash.com uses:
 - http://gpuhash.com
pandemic
Sr. Member
****
Offline Offline

Activity: 431
Merit: 250


View Profile
May 02, 2012, 02:34:23 AM
 #3

Interesting. Looks like he's only using 2 gpu's.

What's the difference between rainbow tables, dictionary word list, and precomputed hashes?
rjk
Sr. Member
****
Offline Offline

Activity: 448
Merit: 250


1ngldh


View Profile
May 02, 2012, 03:55:39 AM
 #4

Interesting. Looks like he's only using 2 gpu's.

What's the difference between rainbow tables, dictionary word list, and precomputed hashes?

Rainbow tables are generated by bruteforcing the hashes and storing them for later. Dictionary word lists are also a table of hashes, but smaller in size due to only including common dictionary words and permutations, not the entire bruteforced keyspace. Precomputed hashes refer to both rainbow tables and dictionary lists.

Mining Rig Extraordinaire - the Trenton BPX6806 18-slot PCIe backplane [PICS] Dead project is dead, all hail the coming of the mighty ASIC!
RodeoX
Legendary
*
Offline Offline

Activity: 2590
Merit: 1028


The revolution will be monetized!


View Profile
May 02, 2012, 06:50:33 PM
 #5

Not that I would know about war driving, but...   Wink
You can also capture enough traffic to calculate a password. It may take 2gig. of data however. On a little used system that could take a while.

The gospel according to Satoshi - https://bitcoin.org/bitcoin.pdf

Free bitcoin in AFRICA - https://bitcointalk.org/index.php?topic=2710325.msg27720734
rjk
Sr. Member
****
Offline Offline

Activity: 448
Merit: 250


1ngldh


View Profile
May 02, 2012, 06:51:07 PM
 #6

Not that I would know about war driving, but...   Wink
You can also capture enough traffic to calculate a password. It may take 2gig. of data however. On a little used system that could take a while.
That only works with WEP.

Mining Rig Extraordinaire - the Trenton BPX6806 18-slot PCIe backplane [PICS] Dead project is dead, all hail the coming of the mighty ASIC!
RodeoX
Legendary
*
Offline Offline

Activity: 2590
Merit: 1028


The revolution will be monetized!


View Profile
May 02, 2012, 06:58:47 PM
 #7

Not that I would know about war driving, but...   Wink
You can also capture enough traffic to calculate a password. It may take 2gig. of data however. On a little used system that could take a while.
That only works with WEP.
Oh, that's right. Forgot that. TY!

The gospel according to Satoshi - https://bitcoin.org/bitcoin.pdf

Free bitcoin in AFRICA - https://bitcointalk.org/index.php?topic=2710325.msg27720734
pandemic
Sr. Member
****
Offline Offline

Activity: 431
Merit: 250


View Profile
May 02, 2012, 09:34:10 PM
 #8

Not that I would know about war driving, but...   Wink
You can also capture enough traffic to calculate a password. It may take 2gig. of data however. On a little used system that could take a while.
That only works with WEP.
Oh, that's right. Forgot that. TY!
Yeah, WEP is pretty simple especially on a network with at least one user. On a good day, you can crack that in under 5 minutes. With no users on the network it takes a bit longer.

WPA/WPA2 is a whole nother ball game, lol
Pages: [1]
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!