上尉
- 注册时间
- 2009-7-23
- 金币
- 1047 个
- 威望
- 0 个
- 荣誉
- 0 个
累计签到:3 天 连续签到:0 天 [LV.20]漫游旅程
|
coWPAtty for Windows MAIN:9 ^, `/ T9 n8 K# g
* d- G. a$ H. W( Q {- K( k# e( y _: n" N
"coWPAtty is designed to audit the pre-shared key (PSK) selection for WPA networks based on the TKIP protocol." - Joshua Wright. . u: `( V1 p5 P
, v& T. o3 E0 [) J8 m. k8 r1 [1 Y/ _ % [+ v1 x q; u) h
* b0 j7 D( ?' l+ L$ G
Project Homepage: http://www.willhackforsushi.com/Cowpatty.html
) _' \. M7 `( k, ]3 r% n; T% c# n# r3 U: ^, e
3 l$ v2 V7 a5 x1 b% s
4 z4 ^+ c9 b5 v F, G" N" @( k, Y/ d# X. q0 _( t
0 l# y( z0 X$ U+ C/ S. y1 A# B: U# K; M3 B
Local Mirror: Cowpatty-4.0-win32.zip MD5: aa9ead2aacfcc493da3684351425d4c6; o) Q! S% a7 ]
X0 n2 B9 w4 ~% ?- ^8 [! Z2 E
6 a% ~% x, H" b8 E$ l4 M& W f1 E! B- }' e/ g; r! ]6 V6 [: u2 Q M! G& L6 F+ U- i+ u: H, T% |) j
; O6 E+ }+ t' ^# J+ d Q
coWPAtty Dictionary Attack
+ ~5 L# K( L! K! y7 h$ w% y1 m! c
: v) |+ G4 z6 y9 O7 k/ v; F: C! s5 U& Y
/ J3 y m- m o. O+ e3 u; K+ ]& A
Precomputing WPA PMK to crack WPA PSK
( \8 o; @# ~* ^2 O1 p5 c' |
* B" u" @) N C. J8 L @* c$ r1 y V
' Y y; | I' A5 ~/ j6 I, x2 Z" O( Z- l3 L! W7 G
coWPAtty Precomputed WPA Attack8 z; r0 J5 m: `% C8 [
' A0 W7 j# O& d6 l# _" ~, _
# l) p7 p' s8 N7 k, r0 |2 h4 X+ S9 A
6 u; l7 \4 T) ^* _coWPAtty Recomputed WPA2 Attack1 {, F$ r# j3 C3 q9 G9 d Z
% D- z: @8 y; k- C) i V
/ O1 n0 t; X a3 q( b3 O- G% L( _6 }2 V+ L% V2 M8 I7 v, s* z
, \3 D# y5 Y/ i" M4 r5 B0 L/ KcoWPAtty Tables9 r) U2 P9 z3 C( y% S l
' C! n$ H' D* n# v
J Z6 w0 w* B6 l! i: K
* t% r# @/ q7 v' q! P; |" ^coWPAtty Usage:
! d+ c! W! L2 B8 X; C! P/ i* _1 j; a3 c
3 B1 n- P7 b8 x1 y2 K( g3 t) z% k- i/ d& D ( z+ A& s, x0 t( m- d- R! k$ i3 E) F x0 X2 g% v
coWPAtty Dictionary Attack:: u, g: R' Q( j- T5 Y i1 O1 g2 T3 b* z& T$ |4 R o- L. F+ j6 R4 E
- J' y, F, h! B
Toperform the coWPAtty dictionary attack we need to supply the tool witha capture file that includes the TKIP four-way handshake, a dictionaryfile of passphrases to guess with and the SSID for the network.
& G% x' t+ C5 o/ W3 m% p5 A
+ e' q4 J' M& C+ j2 H( v( S2 I3 h0 x/ j. y2 Z' {% b7 T, C/ z- [# h8 I- S
T& n" O' w: @' MIn orderto collect the four-way handshake you can either wait until a clientjoins the network or preferably you can force it to rejoin the networkusing tools like void11 or aireplay and capture the handshakes usingsomething like kismet, ethereal or airodump.3 m8 I+ Y* g8 N8 o
) K8 p7 f$ v! m# f' [
/ x& L0 O1 M v6 V* g9 j, e3 Y% k* k
2 J( |7 {$ p7 M1 Q; I
7 g" M% K# L! j: x6 vcowpatty -f dict -r wpapsk-linksys.dump -s linksys7 J. O+ ~/ m0 B0 h
; V7 M; x6 U6 p4 _0 K& r
6 g* {& j2 G+ z+ P) b) [5 U6 f) y' N! }3 L2 E0 d- @( Y! o7 M( O' c U3 S: f2 {
9 x t3 n3 s' e1 r, b% J% I _
7 O, j6 l1 o3 u, `5 t$ M- T' x3 [8 j" O. D0 F( w3 }$ p/ r" Q" o# n( r# M: {: s2 D2 F: k7 ^, u; v
" L6 F+ }' F0 v: Q6 y
/ |2 I* a8 q. O# a2 K5 s8 G1 Z5 }- w4 o* ~, @7 h( c+ ~7 h/ l4 m5 S5 c" p
As youcan see this simple dictionary attack took 51 seconds, we can speed upthis process by precomputing the WPA-PMK to crack the WPA-PSK (seebelow).# x7 n# }2 N% o4 k4 L) Q
5 F1 U( m/ p0 I R' |' {
5 _8 o6 F; q7 Z! O w
: @; x* X/ J; M
: |: s/ Z# V' y3 E7 F7 }- Mwpapsk-linksys.dump is the capture containing the four-way handshake
+ O% o* Y& Q N1 T4 i8 K J( [( i: W' w( P
0 N. I5 h9 e" V/ f T
4 k8 T/ f' x- `; |" h! z! G# [, }: F7 t
dict is the password file
& {- ~/ |6 y4 U+ D' c0 Y' h: k/ A' O" Z" M
, ~) W: L! d6 I& f' h5 w9 K. g) ?
1 ]# F5 A7 i- c* ^& u9 t: K6 o/ M! r) G/ U- [9 E9 h, u5 @
linksys is the network SSID3 f& ^- L) N- j c
4 H# Q) l$ Y( W" G0 s7 q5 G2 `1 M2 a- w" M/ m
' V& W2 D; {# f7 H Z. m% @4 y6 r- `( c* R* e( I- S; k, j; b% ]4 J
Precomputing WPA PMK to crack WPA PSK:: m% P7 e& G5 F g& I! C
. ^% z1 ^) f3 h/ M: {" Q
- t0 [) O; _/ \0 l% {genpmkis used to precompute the hash files in a similar way to Rainbow tablesis used to pre-hash passwords in Windows LANMan attacks. There is aslight difference however in WPA in that the SSID of the network isused as well as the WPA-PSK to "salt" the hash. This means that weneed a different set of hashes for each and every unique SSID i.e. aset for "linksys" a set for "tsunami" etc.
- E& ~9 h5 t! b z5 R
# T9 ?% G( }$ j9 |/ ^) v: K5 N% R! Q8 f* j) K( m
+ X# o5 Y I0 x* \4 |1 f! b3 g! F) ?& X# n2 M _
! z' F F; t9 w8 z
2 ?- T" _2 f: p* I: qSo to generate some hash files for a network using the SSID cuckoo we use:
$ _% a/ J' S8 ^/ D/ J8 j# G2 F5 E- H! B$ a* V% Q
. {2 I j' Q0 Z6 e, W; l' Y% O5 [0 N) Y& R5 B! P5 q. b" |
2 O3 @$ D, r# i* G. {. J8 t; J: I( l% B6 C8 \6 e) k4 y) H" @" R
genpmk -f dict -d linksys.hashfile -s linksys / g8 }: d) b; o
9 q+ ]) o$ g1 }) M) s3 A8 M4 z7 x0 S( b3 I- F. P# |( F
n% o5 _+ q& `( j2 A0 A* @' X3 D( Z0 n, C
- ?2 i8 E ]3 Y. R4 Q0 N3 |6 ?0 Z& { f; c: T; o: e$ m& b
: H* Y6 `3 W$ E# [/ ^; [4 Y& ?: i2 a0 `$ O8 [/ G: ~) C7 M: X
3 D; ~% a4 w" ~9 |) R
5 m" k/ ?7 H) f& S( q# B% X$ R9 q# v/ z
1 F( c$ E, W ?* s6 Y
9 s& R5 L+ e, r; hdict is the password file
9 p+ d# h) R9 e) b& ]% m
1 e; |- }1 u; W( M3 ]' T1 v! Q. v1 \4 H/ j# W% ^1 y) G
; {# S6 d3 s4 B2 f. ]+ q$ A/ u
d( G' Z; w$ vlinksys.hashfile is our output file+ `* ~' v/ x4 S* i+ V) c
7 T( s& C5 z% s* d) U! p' Z- B2 D9 C1 `0 I$ m; E; |1 E( A; P7 n; u- |/ Y
! o, v/ t5 ]9 Z! Y! C, flinksys is the network ESSID
' o5 ?! v @4 o3 h7 \1 V. B y2 w- b3 P- r' V U8 n. Y W: U
* z/ x ~) p) R g Y, @& V# V
6 v6 {7 b0 b5 H' {* S; ^4 B
" ]6 R) ~8 v/ B9 M( P8 a% S% `0 r5 r( XcoWPAtty Precomputed WPA Attack:# ?/ x) d2 _& C+ W/ i. f# {6 l/ w4 w$ J b
/ z& l: B, t3 G# v* }
Now wehave created our hash file we can use it against any WPA-PSK networkthat is utilising a network SSID of cuckoo. Remember the capture(wpa-test-01.cap) must contain the four-way handshake to be successful.
2 n' t7 |, J7 q& J* e: }* E8 R2 S2 w- m _8 v3 Z* a
3 m" r/ l3 a2 G; @+ I# A1 Q# c$ \5 c; E0 }4 `: g6 Z" A4 P
0 K; o" p/ Z+ I5 u+ @! H! P$ M% I# S! N
& v2 I3 a# Q# B6 ?" |cowpatty -d linksys.hashfile -r wpapsk-linksys.dump -s linksys
& u( h% _& H; P, g! V# S3 [
7 X( n" d4 b( q4 c- o8 y+ {# d \& b( s, m, N& P6 Q$ O$ |; l" u. p+ c: N
8 ^ s- U# y d
% m. q ^. ]4 V6 f g8 E+ q9 {, j: x8 G% e; f: d3 U! h
& R1 V1 X u4 A# O
1 {: @/ S* C- k% a, }
$ r' P# L! X" ^3 K* s# }( e$ }9 ?( M' |! ]9 l1 k$ W, a) ?& z6 [, \1 e8 p
wpa-test-01.cap is the capture containing the four-way handshake
2 M4 O* g+ S; \7 |9 j* x# |& F
+ { e+ c% v9 D6 T E: X. { e2 R w8 A3 n% x7 S% K+ d! `6 I V6 i6 Q4 h$ b+ t$ [0 o
* j/ b. S9 w$ Y3 c
linksys.hashfile are our precomputed hashes
0 I# ?6 `2 g& s
E9 |1 z! a+ K$ y1 V$ \8 I3 \: a
7 |/ @! u( @) `+ G* @$ h4 X; e- M" y* t# g+ i
+ Q/ V) T) j+ f8 Z: xlinksys is the network ESSID
- b2 \. ~, J2 u$ B
9 y: z" D8 \8 r, t% K+ H! o [1 |3 a8 E8 y0 l& e
: j3 M' _8 i" d9 e5 b
; [7 m6 B( W) a2 L ?# w) ?( }2 j( u# n9 x
- y5 Z* W/ F' x! F; ]Notice that cracking the WPA-PSK took 0.04 seconds with the pre-computed attacked as opposed to 200 secondswith standard dictionary attack mode, albeit you do need to pre-computethe hash files prior to the attack. However, precomputing large hashfiles for common SSIDS (e.g. linksys, tsunami) would be a sensible movefor most penetration testers.5 D% ]3 l7 A3 E
# {/ B! A7 C9 c R" k& a: p/ u. L4 |* C0 e
7 I1 g2 U. H5 M* T) \+ W! X1 z4 O: }- l$ l- F$ O* _$ C3 _
: M2 a, S) v# e; V0 T3 b% WcoWPAtty Precomputed WPA2 Attack:% Y9 v4 y3 D7 H) H d$ |' D
0 P$ y5 O0 Z3 d* I+ ~# k! G; F9 C$ H2 `
coWPAtty4.0 is also capable of attacking WPA2 captures. Note: The same hashfile as was used with the WPA capture was also used with the WPA2capture.
\7 h' G5 p3 Y5 V7 z+ W) p3 T" [% @ I# k* Z; q0 @
- W9 m7 }. Z' Q! B1 S6 A L5 ?1 e3 k& h3 M Q o' L
: {6 U4 R) D8 P8 |
cowpatty -d linksys.hashfile -r wpa2psk-linksys.dump -s linksys, Q6 v1 v1 l: {# d+ K, ^, B3 H
: r6 Z, g4 L9 M* g% }! U
- T7 g( K: i, O% a: M9 t2 j; G* X9 x' b# N3 J$ o* S
, c% `& ~. M2 W7 E% C8 C- _% ^
3 ~0 b- v! q1 m. u0 K* U- k$ o3 H; M% Q( A# m: g9 r. n; P6 G
# h: S0 |6 {$ p$ h6 _3 }8 ?/ U4 W: {! o0 O2 u$ @: }8 q R+ c3 j. Q
% g6 _# a! f X( K1 ?
% R4 M; {9 C5 `4 x% V4 N
$ [3 r& R2 l9 n( Wwpa2psk-linksys.dump is the capture containing the four-way handshake6 T" k% c# }4 y4 R* w& S
8 k: n. \3 x+ k6 O8 l6 N, C/ w, B5 E7 f8 R
% E7 N' r' P3 e q0 m. \& L7 z2 `4 Z6 X& Y& |
dict is the password file
- V! D" o8 Y/ z( |1 s, ^7 X. y. y& |) {1 `% N1 h- O
6 E% `/ y: Y# I2 b
7 o+ P* D) ?2 r* \$ Y ]
, s' p4 L( o/ k) d9 J+ blinksys is the network SSID
- ?# L1 N# v; B1 I$ ]" m4 H6 M! W9 b4 W$ S4 e. \" F
+ S! m& n4 m! a6 a# |; u8 }4 F) c5 i) }5 g- j/ h. A0 M
_! m, M' b9 {9 @, A8 {+ ~: C* v9 v: R7 \9 |* ^
coWPAtty Tables: ! F& t& i* e2 c
2 I; ], f: ~. u& `4 t, P8 gThe Church of Wifi have produced some lookup tables for 1000 SSID's computed against a 170,000 word password file. The resultant table are approximately 7 Gigabytes in size and can be downloaded via Torrent:
: w6 i3 R& c8 a5 _+ W+ u ~( W) a2 a, \1 J8 N b9 v e! c+ W0 y6 }0 e. M7 k* j4 o4 K) R1 G0 ]: K
http://torrents.lostboxen.net/co ... atty-4.0_2006-10-19
9 K/ a6 R( P- t, A( e" c# M( A( _+ F4 M3 K9 d5 d2 g& @, ~& o9 D' c3 a& T
4 l% Y- E. {3 Z5 w9 B$ PA 33 Gigabyte set of tables are also available: http://umbra.shmoo.com:6969/1 P" V6 G( J9 W8 L$ J5 T, D/ K8 t* T) I
6 J3 t- q, E; ^0 A0 Z0 X. x2 R3 r* r" w5 c2 Q
Or you can buy them via DVD, direct from Renderman (initiator of the project): http://www.renderlab.net/projects/WPA-tables/. J% }2 r' B; I6 C+ ~; ` |
|