View Issue Details

IDProjectCategoryView StatusLast Update
0000336Kali Linux[All Projects] Tool Upgradepublic2013-08-16 14:01
Reporterg0tmi1k Assigned Tomuts  
PrioritynormalSeverityminorReproducibilityN/A
Status resolvedResolutionfixed 
Product Version1.0.4 
Target Version1.0.4Fixed in Version1.0.5 
Summary0000336: Upgrade coWPAtty v3.6
DescriptionHomepage: http://wirelessdefence.org/Contents/coWPAttyMain.htm
Download: http://wirelessdefence.org/Contents/Files/cowpatty-4.6.tgz

"coWPAtty is designed to audit the pre-shared key (PSK) selection for WPA networks based on the TKIP protocol." - Joshua Wright. 

Kali Linux 1.0.3, which includes coWPAtty 4.3.
The latest version of coWPAtty 4.6.

When doing Offsec WiFu 3.0 course, the guide uses coWPAtty to brute-force the handshake. However for this to work, coWPAtty needs nonstrict mode. This is not supported in version 4.3.
If upgraded to the latest version, it would fix this issue.
Steps To Reproduceapt-get -y install libssl-dev libpcap-dev
wget http://wirelessdefence.org/Contents/Files/cowpatty-4.6.tgz
tar zxvf cowpatty-4.6.tgz
cd cowpatty-4.6/
make
Additional Informationroot@kali:~/cowpatty-4.6# /usr/bin/cowpatty
cowpatty 4.3 - WPA-PSK dictionary attack. <jwright@hasborg.com>
cowpatty: Must supply a list of passphrases in a file with -f or a hash file
      with -d. Use "-f -" to accept words on stdin.

Usage: cowpatty [options]

    -f Dictionary file
    -d Hash file (genpmk)
    -r Packet capture file
    -s Network SSID (enclose in quotes if SSID includes spaces)
    -h Print this help information and exit
    -v Print verbose information (more -v for more verbosity)
    -V Print program version and exit

root@kali:~/cowpatty-4.6# ./cowpatty
cowpatty 4.6 - WPA-PSK dictionary attack. <jwright@hasborg.com>
cowpatty: Must supply a pcap file with -r

Usage: cowpatty [options]

    -f Dictionary file
    -d Hash file (genpmk)
    -r Packet capture file
    -s Network SSID (enclose in quotes if SSID includes spaces)
    -2 Use frames 1 and 2 or 2 and 3 for key attack (nonstrict mode)
    -c Check for valid 4-way frames, does not crack
    -h Print this help information and exit
    -v Print verbose information (more -v for more verbosity)
    -V Print program version and exit

root@kali:~/cowpatty-4.6#

Activities

g0tmi1k

2013-05-03 13:40

administrator   ~0000439

Then needs to be patched & re-compiled:
wget http://proton.cygnusx-1.org/~edgan/cowpatty/cowpatty-4.6-fixup16.patch
patch < cowpatty-4.6-fixup16.patch
make




root@kali:~/cowpatty-4.6# ./cowpatty
cowpatty 4.6 - WPA-PSK dictionary attack. <jwright@hasborg.com>
cowpatty: Must supply a pcap file with -r

Usage: cowpatty [options]

    -f Dictionary file
    -d Hash file (genpmk)
    -r Packet capture file
    -s Network SSID (enclose in quotes if SSID includes spaces)
    -c Check for valid 4-way frames, does not crack
    -h Print this help information and exit
    -v Print verbose information (more -v for more verbosity)
    -V Print program version and exit

root@kali:~/cowpatty-4.6#

muts

2013-08-11 22:06

administrator   ~0000720

Updated to 4.6

Issue History

Date Modified Username Field Change
2013-05-03 13:24 g0tmi1k New Issue
2013-05-03 13:40 g0tmi1k Note Added: 0000439
2013-08-11 22:06 muts Note Added: 0000720
2013-08-11 22:06 muts Status new => closed
2013-08-11 22:06 muts Assigned To => muts
2013-08-11 22:06 muts Resolution open => fixed
2013-08-11 22:06 muts Status closed => resolved
2013-08-11 22:06 muts Product Version => 1.0.4
2013-08-11 22:06 muts Fixed in Version => 1.0.4
2013-08-11 22:06 muts Target Version => 1.0.4
2013-08-16 14:01 dookie Fixed in Version 1.0.4 => 1.0.5