Bueno después de instalar,pyrit,cuda y cowpatty, me dispongo a comprobar la velocidad de mi gráfica:
pyrit benchmark
Resultados:
root@alahin:~# pyrit benchmark
Pyrit 0.4.1-dev (C) 2008-2011 Lukas Lueg http://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3+
Running benchmark (3660.5 PMKs/s)... \
Computed 3660.54 PMKs/s total.
#1: 'CUDA-Device #1 'GeForce 9600 GT'': 3422.5 PMKs/s (RTT 2.8)
#2: 'CPU-Core (SSE2)': 584.4 PMKs/s (RTT 3.0)
Me dispongo a capturar el Handshake,lo consigo con facilidad.
Y ahora a crear las tablas con pyrit:
pyrit -e "essid" -f /root/diccionarios/word.lst passthrough | cowpatty -d - -r /root/claves/clave*.cap -s "essid"
Resultados:
cowpatty 4.6 - WPA-PSK dictionary attack. <jwright@hasborg.com>
Collected all necessary data to mount crack against WPA2/PSK passphrase.
Starting dictionary attack. Please be patient.
Using STDIN for hashfile contents.
Traceback (most recent call last):
File "/usr/local/bin/pyrit", line 6, in <module>
pyrit_cli.Pyrit_CLI().initFromArgv()
File "/usr/local/lib/python2.6/dist-packages/pyrit_cli.py", line 62, in initFromArgv
('all-handshakes', 'aes'))
File "/usr/lib/python2.6/getopt.py", line 91, in getopt
opts, args = do_shorts(opts, args[0][1:], shortopts, args[1:])
File "/usr/lib/python2.6/getopt.py", line 191, in do_shorts
if short_has_arg(opt, shortopts):
File "/usr/lib/python2.6/getopt.py", line 207, in short_has_arg
raise GetoptError('option -%s not recognized' % opt, opt)
getopt.GetoptError: option -f not recognized
fread: Success
Unable to identify the PSK from the dictionary file. Try expanding your
passphrase list, and double-check the SSID. Sorry it didn't work out.
0 passphrases tested in 0.07 seconds: 0.00 passphrases/second
¿Alguien sabe a que se debe el problema?
¿Se podría utilizar estos 2 programas sin el uso de un diccionario?,igual que el crunch y el aircrack,osea teniendo solamente el handshake poder atacarlo con la potencia de la grafica.
Un saludo.
pyrit benchmark
Resultados:
root@alahin:~# pyrit benchmark
Pyrit 0.4.1-dev (C) 2008-2011 Lukas Lueg http://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3+
Running benchmark (3660.5 PMKs/s)... \
Computed 3660.54 PMKs/s total.
#1: 'CUDA-Device #1 'GeForce 9600 GT'': 3422.5 PMKs/s (RTT 2.8)
#2: 'CPU-Core (SSE2)': 584.4 PMKs/s (RTT 3.0)
Me dispongo a capturar el Handshake,lo consigo con facilidad.
Y ahora a crear las tablas con pyrit:
pyrit -e "essid" -f /root/diccionarios/word.lst passthrough | cowpatty -d - -r /root/claves/clave*.cap -s "essid"
Resultados:
cowpatty 4.6 - WPA-PSK dictionary attack. <jwright@hasborg.com>
Collected all necessary data to mount crack against WPA2/PSK passphrase.
Starting dictionary attack. Please be patient.
Using STDIN for hashfile contents.
Traceback (most recent call last):
File "/usr/local/bin/pyrit", line 6, in <module>
pyrit_cli.Pyrit_CLI().initFromArgv()
File "/usr/local/lib/python2.6/dist-packages/pyrit_cli.py", line 62, in initFromArgv
('all-handshakes', 'aes'))
File "/usr/lib/python2.6/getopt.py", line 91, in getopt
opts, args = do_shorts(opts, args[0][1:], shortopts, args[1:])
File "/usr/lib/python2.6/getopt.py", line 191, in do_shorts
if short_has_arg(opt, shortopts):
File "/usr/lib/python2.6/getopt.py", line 207, in short_has_arg
raise GetoptError('option -%s not recognized' % opt, opt)
getopt.GetoptError: option -f not recognized
fread: Success
Unable to identify the PSK from the dictionary file. Try expanding your
passphrase list, and double-check the SSID. Sorry it didn't work out.
0 passphrases tested in 0.07 seconds: 0.00 passphrases/second
¿Alguien sabe a que se debe el problema?
¿Se podría utilizar estos 2 programas sin el uso de un diccionario?,igual que el crunch y el aircrack,osea teniendo solamente el handshake poder atacarlo con la potencia de la grafica.
Un saludo.