View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0000336 | Kali Linux | [All Projects] Tool Upgrade Request | public | 2013-05-03 13:24 | 2013-08-16 14:01 |
Reporter | g0tmi1k | Assigned To | muts | ||
Priority | normal | Severity | minor | Reproducibility | N/A |
Status | resolved | Resolution | fixed | ||
Product Version | 1.0.4 | ||||
Target Version | 1.0.4 | Fixed in Version | 1.0.5 | ||
Summary | 0000336: Upgrade coWPAtty v3.6 | ||||
Description | Homepage: http://wirelessdefence.org/Contents/coWPAttyMain.htm Download: http://wirelessdefence.org/Contents/Files/cowpatty-4.6.tgz "coWPAtty is designed to audit the pre-shared key (PSK) selection for WPA networks based on the TKIP protocol." - Joshua Wright. Kali Linux 1.0.3, which includes coWPAtty 4.3. The latest version of coWPAtty 4.6. When doing Offsec WiFu 3.0 course, the guide uses coWPAtty to brute-force the handshake. However for this to work, coWPAtty needs nonstrict mode. This is not supported in version 4.3. If upgraded to the latest version, it would fix this issue. | ||||
Steps To Reproduce | apt-get -y install libssl-dev libpcap-dev wget http://wirelessdefence.org/Contents/Files/cowpatty-4.6.tgz tar zxvf cowpatty-4.6.tgz cd cowpatty-4.6/ make | ||||
Additional Information | root@kali:~/cowpatty-4.6# /usr/bin/cowpatty cowpatty 4.3 - WPA-PSK dictionary attack. <jwright@hasborg.com> cowpatty: Must supply a list of passphrases in a file with -f or a hash file with -d. Use "-f -" to accept words on stdin. Usage: cowpatty [options] -f Dictionary file -d Hash file (genpmk) -r Packet capture file -s Network SSID (enclose in quotes if SSID includes spaces) -h Print this help information and exit -v Print verbose information (more -v for more verbosity) -V Print program version and exit root@kali:~/cowpatty-4.6# ./cowpatty cowpatty 4.6 - WPA-PSK dictionary attack. <jwright@hasborg.com> cowpatty: Must supply a pcap file with -r Usage: cowpatty [options] -f Dictionary file -d Hash file (genpmk) -r Packet capture file -s Network SSID (enclose in quotes if SSID includes spaces) -2 Use frames 1 and 2 or 2 and 3 for key attack (nonstrict mode) -c Check for valid 4-way frames, does not crack -h Print this help information and exit -v Print verbose information (more -v for more verbosity) -V Print program version and exit root@kali:~/cowpatty-4.6# | ||||
|
Then needs to be patched & re-compiled: wget http://proton.cygnusx-1.org/~edgan/cowpatty/cowpatty-4.6-fixup16.patch patch < cowpatty-4.6-fixup16.patch make root@kali:~/cowpatty-4.6# ./cowpatty cowpatty 4.6 - WPA-PSK dictionary attack. <jwright@hasborg.com> cowpatty: Must supply a pcap file with -r Usage: cowpatty [options] -f Dictionary file -d Hash file (genpmk) -r Packet capture file -s Network SSID (enclose in quotes if SSID includes spaces) -c Check for valid 4-way frames, does not crack -h Print this help information and exit -v Print verbose information (more -v for more verbosity) -V Print program version and exit root@kali:~/cowpatty-4.6# |
|
Updated to 4.6 |
Date Modified | Username | Field | Change |
---|---|---|---|
2013-05-03 13:24 | g0tmi1k | New Issue | |
2013-05-03 13:40 | g0tmi1k | Note Added: 0000439 | |
2013-08-11 22:06 | muts | Note Added: 0000720 | |
2013-08-11 22:06 | muts | Status | new => closed |
2013-08-11 22:06 | muts | Assigned To | => muts |
2013-08-11 22:06 | muts | Resolution | open => fixed |
2013-08-11 22:06 | muts | Status | closed => resolved |
2013-08-11 22:06 | muts | Product Version | => 1.0.4 |
2013-08-11 22:06 | muts | Fixed in Version | => 1.0.4 |
2013-08-11 22:06 | muts | Target Version | => 1.0.4 |
2013-08-16 14:01 | dookie | Fixed in Version | 1.0.4 => 1.0.5 |
2021-05-31 13:37 | rhertzog | Category | Tool Upgrade => Tool Upgrade Request |