This shows you the differences between two versions of the page.
john:WPA-PSK [2017/10/14 03:14] rofl make wpapcap2john tool first class citizen |
john:WPA-PSK [2019/06/15 20:50] (current) solar Updated example commands |
||
---|---|---|---|
Line 15: | Line 15: | ||
From that point you can use john as you always do. | From that point you can use john as you always do. | ||
- | The format comes in three flavours: | + | The format comes in two flavours: |
- | * -format="wpapsk" (currently OpenSSL or SSE2 and is OMP capable) | + | * -format=wpapsk (will use CPUs, is SIMD and OpenMP capable) |
- | * -format="wpapsk-cuda" (for nvidia GPUs) | + | * -format=wpapsk-opencl (for any OpenCL GPU or CPUs) |
- | * -format="wpapsk-opencl" (for any OpenCL GPU or CPUs) | + | |
Example usage: | Example usage: | ||
- | * $hccap2john wpa-Induction.hccap > crackme | + | * $ hccap2john wpa-Induction.hccap > crackme |
- | * $./john -w:password.lst -fo=wpapsk-cuda crackme | + | * $ ./john -w=password.lst -form=wpapsk-opencl crackme |
If "Induction" is in your (by default it is not) password.lst file, john will crack it. | If "Induction" is in your (by default it is not) password.lst file, john will crack it. | ||
If you are interested in how it works visit [[http://beta.ivc.no/wiki/index.php/WPA_Attack|this page]] | If you are interested in how it works visit [[http://beta.ivc.no/wiki/index.php/WPA_Attack|this page]] |