Book Image

Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition

By : Cameron Buchanan
Book Image

Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition

By: Cameron Buchanan

Overview of this book

Table of Contents (19 chapters)
Kali Linux Wireless Penetration Testing Beginner's Guide
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Disclaimer
Preface
Index

Time for action – speeding up the cracking process


We can proceed with the following steps:

  1. We can precalculate the PMK for a given SSID and wordlist using the genpmk tool with the following command:

    genpmk –f <chosen wordlist>–d PMK-Wireless-Lab –s "Wireless Lab
    

    This creates the PMK-Wireless-Lab file containing the pregenerated PMK:

  2. We now create a WPA-PSK network with the passphrase abcdefgh (present in the dictionary we used) and capture a WPA-handshake for that network. We now use Cowpatty to crack the WPA passphrase, as shown in the following screenshot:

    It takes approximately 7.18 seconds for Cowpatty to crack the key, using the precalculated PMKs.

  3. We now use aircrack-ng with the same dictionary file, and the cracking process takes over 22 minutes. This shows how much we are gaining because of the precalculation.

  4. In order to use these PMKs with aircrack-ng, we need to use a tool called airolib-ng. We will give it the options airolib-ng, PMK-Aircrack --import,and cowpatty PMK-Wireless...