View Issue Details

IDProjectCategoryView StatusLast Update
0000336Kali LinuxTool Upgrade Requestpublic2013-08-16 14:01
Reporterg0tmi1k Assigned Tomuts  
PrioritynormalSeverityminorReproducibilityN/A
Status resolvedResolutionfixed 
Platformx86OSKaliOS Version1.0
Product Version1.0.4 
Fixed in Version1.0.5 
Summary0000336: Upgrade coWPAtty v3.6
Description

Homepage: http://wirelessdefence.org/Contents/coWPAttyMain.htm
Download: http://wirelessdefence.org/Contents/Files/cowpatty-4.6.tgz

"coWPAtty is designed to audit the pre-shared key (PSK) selection for WPA networks based on the TKIP protocol." - Joshua Wright. 

Kali Linux 1.0.3, which includes coWPAtty 4.3.
The latest version of coWPAtty 4.6.

When doing Offsec WiFu 3.0 course, the guide uses coWPAtty to brute-force the handshake. However for this to work, coWPAtty needs nonstrict mode. This is not supported in version 4.3.
If upgraded to the latest version, it would fix this issue.

Steps To Reproduce

apt-get -y install libssl-dev libpcap-dev
wget http://wirelessdefence.org/Contents/Files/cowpatty-4.6.tgz
tar zxvf cowpatty-4.6.tgz
cd cowpatty-4.6/
make

Additional Information

root@kali:~/cowpatty-4.6# /usr/bin/cowpatty
cowpatty 4.3 - WPA-PSK dictionary attack. <[email protected]>
cowpatty: Must supply a list of passphrases in a file with -f or a hash file
with -d. Use "-f -" to accept words on stdin.

Usage: cowpatty [options]

-f  Dictionary file
-d  Hash file (genpmk)
-r  Packet capture file
-s  Network SSID (enclose in quotes if SSID includes spaces)
-h  Print this help information and exit
-v  Print verbose information (more -v for more verbosity)
-V  Print program version and exit

root@kali:~/cowpatty-4.6# ./cowpatty
cowpatty 4.6 - WPA-PSK dictionary attack. <[email protected]>
cowpatty: Must supply a pcap file with -r

Usage: cowpatty [options]

-f  Dictionary file
-d  Hash file (genpmk)
-r  Packet capture file
-s  Network SSID (enclose in quotes if SSID includes spaces)
-2  Use frames 1 and 2 or 2 and 3 for key attack (nonstrict mode)
-c  Check for valid 4-way frames, does not crack
-h  Print this help information and exit
-v  Print verbose information (more -v for more verbosity)
-V  Print program version and exit

root@kali:~/cowpatty-4.6#

Activities

g0tmi1k

g0tmi1k

2013-05-03 13:40

administrator   ~0000439

Then needs to be patched & re-compiled:
wget http://proton.cygnusx-1.org/~edgan/cowpatty/cowpatty-4.6-fixup16.patch
patch < cowpatty-4.6-fixup16.patch
make

root@kali:~/cowpatty-4.6# ./cowpatty
cowpatty 4.6 - WPA-PSK dictionary attack. <[email protected]>
cowpatty: Must supply a pcap file with -r

Usage: cowpatty [options]

-f  Dictionary file
-d  Hash file (genpmk)
-r  Packet capture file
-s  Network SSID (enclose in quotes if SSID includes spaces)
-c  Check for valid 4-way frames, does not crack
-h  Print this help information and exit
-v  Print verbose information (more -v for more verbosity)
-V  Print program version and exit

root@kali:~/cowpatty-4.6#

muts

muts

2013-08-11 22:06

reporter   ~0000720

Updated to 4.6

Issue History

Date Modified Username Field Change
2013-05-03 13:24 g0tmi1k New Issue
2013-05-03 13:40 g0tmi1k Note Added: 0000439
2013-08-11 22:06 muts Note Added: 0000720
2013-08-11 22:06 muts Status new => closed
2013-08-11 22:06 muts Assigned To => muts
2013-08-11 22:06 muts Resolution open => fixed
2013-08-11 22:06 muts Status closed => resolved
2013-08-11 22:06 muts Product Version => 1.0.4
2013-08-11 22:06 muts Fixed in Version => 1.0.4
2013-08-16 14:01 dookie Fixed in Version 1.0.4 => 1.0.5
2021-05-31 13:37 rhertzog Category Tool Upgrade => Tool Upgrade Request