- Инструменты Kali Linux
- Список инструментов для тестирования на проникновение и их описание
- coWPAtty
- Описание coWPAtty
- Справка по coWPAtty
- Справка по genpmk
- Руководство по coWPAtty
- Примеры запуска genpmk
- Примеры запуска coWPAtty
- Установка coWPAtty
- Скриншоты coWPAtty
- Инструкции по coWPAtty
- How To Install cowpatty on Kali Linux
- What is cowpatty
- Install cowpatty Using apt-get
- Install cowpatty Using apt
- Install cowpatty Using aptitude
- How To Uninstall cowpatty on Kali Linux
- Uninstall cowpatty And Its Dependencies
- Remove cowpatty Configurations and Data
- Remove cowpatty configuration, data, and all of its dependencies
- References
- Summary
- coWPAtty
- coWPAtty Help
- genpmk Help
- genpmk Usage Example
- coWPAtty Usage Example
- How to install coWPAtty
- coWPAtty Screenshots
- coWPAtty Tutorials
- cowpatty on Kali Linux
- 2. Uninstall / Remove cowpatty package
- 3. Details of cowpatty package
- 4. References on Kali Linux
- 5. The same packages on other Linux Distributions
Инструменты Kali Linux
Список инструментов для тестирования на проникновение и их описание
coWPAtty
Описание coWPAtty
Реализация оффлайновой атаки по словарю в отношении сетей WPA/WPA2, использующих аутентификацию на основе PSK (например, WPA-Personal). Многие промышленные сети используют механизм аутентификации основанный на PSK для WPA/WPA2, поскольку он намного проще, чем установка необходимого RADIUS, подачи запроса и сертификации архитектуры аутентификации, которые необходимы для аутентификации WPA-Enterprise.
Cowpatty может реализовать ускоренную атаку, если доступен предварительно просчитанный файл PMK для тестируемой в настоящее время SSID.
Вместе с coWPAtty поставляется программа genpmk, которая может произвести предварительный расчёт файла PMK. Тем не менее, процесс просчёта необходимых данных можно значительно ускорить, если применять должным образом настроенную программу Pyrit, которая может использовать для расчётов мощность графического процессора.
Справка по coWPAtty
-f Файл словаря
-d Хеш файл (genpmk)
-r Файл с захваченным пакетом
-s SSID сети (заключите в кавычки, если SSID содержит пробелы)
-c Проверить на валидные 4-полосные фреймы, не взламывать
-h Напечатать справку и выйти
-v Увеличение вербаности (больше -v — больше вербальности)
-V Напечатать версию программы и выйти
Справка по genpmk
-f Файл словаря
-d Файл для сохранения хешей
-s SSID сети
-h Напечатать справку и выйти
-v Увеличение вербаности (больше -v — больше вербальности)
-V Напечатать версию программы и выйти
Руководство по coWPAtty
Примеры запуска genpmk
Используем файл словаря (-f /usr/share/wordlists/nmap.lst) для генерации файла хешей, сохраняем его в файл (-d cowpatty_dict) для заданной ESSID (-s securenet):
root@kali:~# genpmk -f /usr/share/wordlists/nmap.lst -d cowpatty_dict -s securenet genpmk 1.1 - WPA-PSK precomputation attack. File cowpatty_dict does not exist, creating. key no. 1000: pinkgirl 1641 passphrases tested in 4.09 seconds: 401.35 passphrases/second
Примеры запуска coWPAtty
Используем предоставленный хешфайл (-d cowpatty_dict), считываем захваченный пакет (-r Kismet-20140515-16-21-37-1.pcapdump) и взламываем пароль для ESSID (-s 6F36E6):
root@kali:~# cowpatty -d cowpatty_dict -r Kismet-20140515-16-21-37-1.pcapdump -s 6F36E6 cowpatty 4.6 — WPA-PSK dictionary attack.
Установка coWPAtty
Программа предустановлена в Kali Linux.
Установка coWPAtty в Debian, Ubuntu или Linux Mint
sudo apt update sudo apt install libpcap-dev wget http://www.willhackforsushi.com/code/cowpatty/4.6/cowpatty-4.6.tgz tar xvzf cowpatty-*.tgz cd cowpatty* make sudo make install
Информация об установке в другие операционные системы будет добавлена позже.
Скриншоты coWPAtty
Это утилита командной строки.
Инструкции по coWPAtty
How To Install cowpatty on Kali Linux
In this tutorial we learn how to install cowpatty on Kali Linux.
What is cowpatty
If you are auditing WPA-PSK or WPA2-PSK networks, you can use this tool to identify weak passphrases that were used to generate the PMK. Supply a libpcap capture file that includes the 4-way handshake, a dictionary file of passphrases to guess with, and the SSID for the network.
There are three ways to install cowpatty on Kali Linux . We can use apt-get , apt and aptitude . In the following sections we will describe each method. You can choose one of them.
Install cowpatty Using apt-get
Update apt database with apt-get using the following command.
After updating apt database, We can install cowpatty using apt-get by running the following command:
sudo apt-get -y install cowpatty
Install cowpatty Using apt
Update apt database with apt using the following command.
After updating apt database, We can install cowpatty using apt by running the following command:
sudo apt -y install cowpatty
Install cowpatty Using aptitude
If you want to follow this method, you might need to install aptitude first since aptitude is usually not installed by default on Kali Linux. Update apt database with aptitude using the following command.
After updating apt database, We can install cowpatty using aptitude by running the following command:
sudo aptitude -y install cowpatty
How To Uninstall cowpatty on Kali Linux
To uninstall only the cowpatty package we can use the following command:
sudo apt-get remove cowpatty
Uninstall cowpatty And Its Dependencies
To uninstall cowpatty and its dependencies that are no longer needed by Kali Linux, we can use the command below:
sudo apt-get -y autoremove cowpatty
Remove cowpatty Configurations and Data
To remove cowpatty configuration and data from Kali Linux we can use the following command:
sudo apt-get -y purge cowpatty
Remove cowpatty configuration, data, and all of its dependencies
We can use the following command to remove cowpatty configurations, data and all of its dependencies, we can use the following command:
sudo apt-get -y autoremove --purge cowpatty
References
Summary
In this tutorial we learn how to install cowpatty using different package management tools like apt, apt-get and aptitude.
coWPAtty
Implementation of an offline dictionary attack against WPA/WPA2 networks using PSK-based authentication (e.g. WPA-Personal). Many enterprise networks deploy PSK-based authentication mechanisms for WPA/WPA2 since it is much easier than establishing the necessary RADIUS, supplicant and certificate authority architecture needed for WPA-Enterprise authentication. Cowpatty can implement an accelerated attack if a precomputed PMK file is available for the SSID that is being assessed.
Together with coWPAtty comes genpmk tool, which can make a preliminary calculation of the PMK file. Nevertheless, the process of rendering the necessary data can be significantly speeded up by using a properly configured Pyrit or Hashcat, which can use the power of the graphics processor for calculations.
coWPAtty Help
-f Dictionary file -d Hash file (genpmk) -r Packet capture file -s Network SSID (enclose in quotes if SSID includes spaces) -c Check for valid 4-way frames, does not crack -h Print this help information and exit -v Print verbose information (more -v for more verbosity) -V Print program version and exit
genpmk Help
-f Dictionary file -d Output hash file -s Network SSID -h Print this help information and exit -v Print verbose information (more -v for more verbosity) -V Print program version and exit
After precomputing the hash file, run cowpatty with the -d argument.
genpmk Usage Example
Use the provided dictionary file (-f /usr/share/wordlists/nmap.lst) to generate a hashfile, saving it to a file (-d cowpatty_dict) for the given ESSID (-s securenet):
genpmk -f /usr/share/wordlists/nmap.lst -d cowpatty_dict -s securenet genpmk 1.1 - WPA-PSK precomputation attack. File cowpatty_dict does not exist, creating. key no. 1000: pinkgirl 1641 passphrases tested in 4.09 seconds: 401.35 passphrases/second
coWPAtty Usage Example
Use the provided hashfile (-d cowpatty_dict), read the packet capture (-r Kismet-20140515-16-21-37-1.pcapdump), and crack the password for the given ESSID (-s 6F36E6):
cowpatty -d cowpatty_dict -r Kismet-20140515-16-21-37-1.pcapdump -s 6F36E6 cowpatty 4.6 — WPA-PSK dictionary attack.
How to install coWPAtty
The program is pre-installed on Kali Linux.
To install coWPAtty in Debian, Ubuntu or Linux Mint
sudo apt update sudo apt install libpcap-dev wget http://www.willhackforsushi.com/code/cowpatty/4.6/cowpatty-4.6.tgz tar xvzf cowpatty-*.tgz cd cowpatty* make sudo make install
coWPAtty Screenshots
The program is a command-line utility.
coWPAtty Tutorials
cowpatty on Kali Linux
Please follow the steps below to install cowpatty package:
2. Uninstall / Remove cowpatty package
This guide covers the steps necessary to uninstall cowpatty package:
3. Details of cowpatty package
Package: cowpatty
Source: cowpatty (4.8-3)
Version: 4.8-3+b1
Installed-Size: 77
Maintainer: Debian Security Tools
Architecture: amd64
Depends: libc6 (>= 2.33), libpcap0.8 (>= 0.9.8), libssl3 (>= 3.0.0)
Size: 24272
SHA256: 53e71cdabe8de325c84d78f211be0afd1b73cd8fa6d8147620ac8565468b456b
SHA1: 573d3f71e936c1f3f36a318f92cd8b3f0450a045
MD5sum: 22860668b55028e0a13d2410fef639f4
Description: Brute-force WPA dictionary attack
If you are auditing WPA-PSK or WPA2-PSK networks, you can use
this tool to identify weak passphrases that were used to generate the
PMK. Supply a libpcap capture file that includes the 4-way handshake, a
dictionary file of passphrases to guess with, and the SSID for the
network.
Description-md5: 3e82bcb92c2aa53c2419032e302ba973
Homepage: https://www.willhackforsushi.com/?page_id=50
Section: net
Priority: optional
Filename: pool/main/c/cowpatty/cowpatty_4.8-3+b1_amd64.deb
4. References on Kali Linux
5. The same packages on other Linux Distributions
cowpatty (4.8-3) Ubuntu 21.04 (Hirsute Hippo)
cowpatty (4.8-2) Ubuntu 20.10 (Groovy Gorilla)
cowpatty (4.8-3) Ubuntu 21.10 (Impish Indri)
cowpatty (4.8-3build1) Ubuntu 22.04 LTS (Jammy Jellyfish)
cowpatty (4.8-2) Debian 10 (Buster)