We can proceed with the following steps:
We can pre-calculate the PMK for a given SSID and wordlist using the
genpmk
tool with the following command:genpmk -f <chosen wordlist> -d PMK-Wireless-Lab -s "Wireless Lab"
This creates the
PMK-Wireless-Lab
file containing the pregenerated PMK:We now create a WPA-PSK network with the passphrase
abcdefgh
(present in the dictionary we used) and capture a WPA-handshake for that network as we did with the previous exercise; alternatively, use the files we used previously. We now use Cowpatty to crack the WPA passphrase, as shown in the following screenshot:It takes approximately 7.18 seconds for Cowpatty to crack the key, using the precalculated PMKs.
We now use
aircrack-ng
with the same dictionary file, and the cracking process takes over 22 minutes. This shows how much we are gaining because of the precalculation.