phillips321.co.uk

pen testing, security and linux

  • Home
  • About Me
  • bt5-fixit.sh
  • GnackTrack
  • Metasploit Notes
  • pentest.sh

hccap

Cracking WPA 4way handshakes with your GPU!

Published March 24, 2012 | By phillips321

We need to capture the WPA 4 way handshake in order to perform an offline GPU attack. For this demo we’ll be using an Alfa AWUS036H wireless card under Backtrack 5 R2 64bit.

Now I could go in depth about capturing the WPA handshake manually using aircrack-ng but it has been covered in full in many places already, so instead im going to use a great python tool call… Continue reading →

Posted in Uncategorized | Tagged aircrack, aircrack-ng, cracking, gpu, hashcat, hccap, ocl-hashcat, wpa, wpa2 | 2 Comments
Follow @phillips321

Recent Posts

  • Automating an Active Directory Audit in PowerShell
  • CherryTree on MacOS (OSX)
  • IPv6 LocalLink to IPv4 scanning tool
  • NetKit IPv6 Test Lab
  • WiPiResponder = Pi Zero W + Responder
  • Recovering an activity from a Garmin 920 XT Forerunner
  • hashcat on OS X – getting it going!
  • PHP NMAP Scan Page
  • Hacking the ATN X-sight – part1
  • NFSShell on Kali Linux 2.0

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Links

  • 0entropy
  • BruteForce Lab's Blog
  • carnal 0wnage
  • DarkOperator
  • Extra
  • grm n00bs
  • Hack Whack and Smack
  • IronGeek
  • Night Slayer
  • pentest-n00b
  • PenTesticles
  • room362
  • ScriptMonkey

Please feel free to share my content but always link back here :-)