![]() ![]() Depending on your intentions, on a professional audit it may be easier and more feasible to simply ask for the passphrase and ensure it would not be in a dictionary likely to be used by an attacker. However, if you use a huge dictionary or try to do an exhaustive search, you'll be sitting there somewhere on this side of forever waiting. If the passphrase used is not in the dictionary supplied to coWPAtty, there is no chance of recovering the key. The ability to crack a WPA key is based on two things: the quality and size of the dictionary used and the amount of time an attacker is willing to invest. ![]() ![]() When coWPAtty was first altered to add support for WPA2, it was only a few lines of code in the parser that needed to be changed the rest of the code was fine as it was. Since WPA and WPA2 share the same key generation mechanism, the same attack on password selection works on both. Brad Haines, in Seven Deadliest Wireless Technologies Attacks, 2010 How to Crack WPA PSK and WPA2 PSK ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |