上尉
- 注册时间
- 2009-7-23
- 金币
- 1047 个
- 威望
- 0 个
- 荣誉
- 0 个
累计签到:3 天 连续签到:0 天 [LV.20]漫游旅程
|
coWPAtty for Windows MAIN:2 |$ v; u. T B# L0 q8 h) ^
* d- G. a$ H. W
" o3 I/ g7 ^6 B/ n"coWPAtty is designed to audit the pre-shared key (PSK) selection for WPA networks based on the TKIP protocol." - Joshua Wright.
" D# u) w4 Z; s) [5 E, v& T. o3 E0 [) J8 m. k8 r1 [1 Y/ _
/ n: O' \. o$ N/ z! t0 B# V E1 o5 v8 J' y
Project Homepage: http://www.willhackforsushi.com/Cowpatty.html * v" T+ t1 A: K. B
6 b' Z. ~" ^, D) i; y1 K
, }. D# Y/ V, C2 G9 k& [4 z4 ^+ c9 b5 v F, G" N$ e) h/ Y4 i9 q9 `; T. Z W0 ?
0 l# y( z0 X$ U+ C/ S. y1 A
7 u: w% N7 d2 ]. E& k. ]Local Mirror: Cowpatty-4.0-win32.zip MD5: aa9ead2aacfcc493da3684351425d4c6* \$ Y5 e% P4 j" m) q6 Q8 Q9 G
5 p$ @+ L1 j+ N( v% Q& s2 G4 E+ q4 ^0 J$ J) _
8 E$ l4 M& W f1 E! B- }' e/ g; r! ]6 V6 [: u2 Q M! G& L6 F
9 j% D. l# ]: V- y: x& ?# C& ]! I% A( b. R+ `5 q. c* N
coWPAtty Dictionary Attack
0 J# V2 a2 g& U- q! g. [7 `3 z, I% {" I
0 w3 s7 r/ e& S4 a" |7 F: v) |+ G4 z6 y9 O
0 P0 E4 ]# i9 W; Y( V1 Z& a5 L9 p7 u0 Z( M; V
Precomputing WPA PMK to crack WPA PSK
8 H& A) Y2 {* F* k* ?, X& h. l2 ^% j3 x& t" t' Z
8 L @* c$ r1 y V
- W- Y% \+ I; x8 K2 W: w# W+ V) y
* B! ^1 A5 g$ D1 E6 j3 P p' R) { IcoWPAtty Precomputed WPA Attack7 R: |* u: y+ L" l% T% U- c
( l K* H1 _% r5 h
) ~- _' b. P5 }, g9 ^) q1 s, r0 |2 h4 X+ S9 A' Q) k" \- A# q
coWPAtty Recomputed WPA2 Attack6 |8 T5 T( t8 ^ [5 H @( m+ K
5 F* M, U4 t$ h Z. e4 z
) I- h3 v& t z( Z8 |9 B( b3 O- G% L( _6 }2 V+ L% V2 M8 I7 v, s* z* q: E: z8 k3 l
coWPAtty Tables
: Z+ z8 ~' @2 `+ n* K5 Y9 k$ J) Q8 a6 s# o* q7 L7 g1 J
J Z6 w0 w* B6 l! i: K: R; `" o" ^% |+ G0 [" ]! i9 L+ G
coWPAtty Usage:( ^ q! n2 g) L1 o! i
! P/ i* _1 j; a3 c! n' L0 _* H. R( o4 y$ p, Q
3 t) z% k- i/ d& D ( z+ A& s, x0 t( m- d- R7 Q6 ^9 U, O6 y0 |: q
coWPAtty Dictionary Attack:: u, g: R' Q( j- T5 Y i1 O1 g2 T' y% {5 h5 N; G6 C \( F
- j9 q9 a& g" c
Toperform the coWPAtty dictionary attack we need to supply the tool witha capture file that includes the TKIP four-way handshake, a dictionaryfile of passphrases to guess with and the SSID for the network.
( f' {5 L) \1 k% p$ M! W% ^8 s4 \
( S2 I3 h0 x/ j. y2 Z' {% b" o$ o8 p t" c( }7 `: A
" b; x$ [$ D2 S7 dIn orderto collect the four-way handshake you can either wait until a clientjoins the network or preferably you can force it to rejoin the networkusing tools like void11 or aireplay and capture the handshakes usingsomething like kismet, ethereal or airodump.( c( E/ f& I2 }( ?/ G' k+ z" j: O
5 A* D! ]- P- w/ X4 q/ x& L0 O1 M v6 V* g9 j, e3 Y% k* k
4 ]7 b. |, h. l, F7 U; ]9 o2 K/ ]3 m9 k; H) v
cowpatty -f dict -r wpapsk-linksys.dump -s linksys2 R& E$ L- q# K; \" D+ d4 r3 e8 n
. L- w" t. Q! ?7 d' B# r/ J5 ]9 N/ G
5 U6 f) y' N! }3 L2 E0 d
' j G6 H1 ^, E. c: J. d; d) [9 x t3 n3 s' e1 r, b% J% I _2 _: w' j6 r0 s" x9 U% w
8 j" O. D0 F( w3 }$ p/ r" Q" o# n( r# M: {. A6 }. n+ b7 ~- h8 t
" L6 F+ }' F0 v: Q6 y
" A. C+ C8 _! u
4 M2 k/ B8 o) _& zAs youcan see this simple dictionary attack took 51 seconds, we can speed upthis process by precomputing the WPA-PMK to crack the WPA-PSK (seebelow).
8 H# N. P5 F+ p# `% l& m7 [" m7 i4 A; X/ G
) h% K& R3 [, b# t: @; x* X/ J; M
% m. n6 c3 U; `# }: G2 Dwpapsk-linksys.dump is the capture containing the four-way handshake" W F4 w. d4 M/ U' K+ ^6 W/ `' k
1 n- v; R7 R. z- O
0 N. I5 h9 e" V/ f T
0 b/ l4 ~4 \- q: D0 C2 |9 ?2 p( {! g# H: |7 m9 t; B _ A# z# ~
dict is the password file! k4 [8 }$ s" W8 ?
; K( d5 I& T1 E+ ]
, ~) W: L! d6 I& f' h5 w9 K. g) ?( J$ _8 w% O# V6 y3 ?! S/ j2 t
5 R, b: M m. A
linksys is the network SSID+ D6 Y0 k, `* U, O8 v' L( o
6 ?6 k, b. `$ T* ?- n7 {# f: V3 u* R+ k+ q3 Z
' V& W2 D; {# f7 H Z. m% @4 y6 r- `( c* R* e( I9 a9 A% r- l [* o; o6 A
Precomputing WPA PMK to crack WPA PSK:7 I- f2 H- p; ~/ x; e; I
. ^% z1 ^) f3 h/ M: {" Q0 Z! [& o3 X8 w" S" ? s' W0 ]3 s
genpmkis used to precompute the hash files in a similar way to Rainbow tablesis used to pre-hash passwords in Windows LANMan attacks. There is aslight difference however in WPA in that the SSID of the network isused as well as the WPA-PSK to "salt" the hash. This means that weneed a different set of hashes for each and every unique SSID i.e. aset for "linksys" a set for "tsunami" etc.$ T) e8 `. v8 B p. D. u' h+ R+ C
0 _0 L7 e1 \ @ Y) q- Z0 X5 Q
3 h( J. ]* d3 F- { F! t! }+ X# o5 Y I0 x* \4 |1 f! b3 g! F) ?& X# n2 M _3 A$ Y( Y& h; [( u' Y. P4 b/ X
- Z! G: y$ r5 y1 d
So to generate some hash files for a network using the SSID cuckoo we use:
7 P9 e0 _6 S4 ^
) i o& t+ J, w5 l. {2 I j' Q0 Z6 e, W; l' Y
/ j8 c j/ k4 i- @& }7 \
$ V, ^) O. E' z4 s$ c) R8 t; J: I( l% B6 C
! x, ^5 b( U6 g* Igenpmk -f dict -d linksys.hashfile -s linksys
+ Y* z" X2 R0 w, ]) i
6 z @2 l5 L8 j2 k0 Y7 h6 R: ~8 M4 z7 x0 S( b3 I- F. P# |( F
: t7 Z6 \- i* F; f, V" o6 c! O( X; V; \
- ?2 i8 E ]3 Y. R4 Q0 N3 |6 ?0 Z0 U% P1 s: J. s( u5 V* ~# P0 A
* C5 X: Q+ n3 F/ ~( w! ~) ]2 q! Z. i1 m6 |
' V" c6 _- z4 f0 Z% E' F
5 m" k/ ?7 H) f& S
6 B7 C3 C1 c E" A& @1 I- q1 F( c$ E, W ?* s6 Y
/ Z% m: I( t. C5 N* {" Zdict is the password file
. C; V/ P: {8 T8 Y
1 F$ q) k* h% f' ~: ], W1 v! Q. v1 \4 H/ j# W% ^1 y) G
6 _) | M$ T( x: F0 P, S) x, f$ ^) s3 n' H8 }/ g% E
linksys.hashfile is our output file
4 H' T1 @! K4 z
/ G# O. d5 P- ~; P% S# c9 C1 `0 I$ m; E; |5 P" f. `! h! X/ y3 G }; [# G+ n
& N- J- R' ]& E$ @8 {0 Wlinksys is the network ESSID
q0 d7 b6 |$ y. q" N- X1 L! d ]4 L% A6 h2 x. _4 T
5 ]4 A: @; o/ t& j2 z
6 v6 {7 b0 b5 H' {* S; ^4 B
) T0 J- ]/ \/ G( P8 a% S% `0 r5 r( XcoWPAtty Precomputed WPA Attack:# ?/ x) d2 _& C+ W/ i+ q* u) a3 U3 a/ b; ]+ D" _
$ b7 _4 q- A) x* P; C. jNow wehave created our hash file we can use it against any WPA-PSK networkthat is utilising a network SSID of cuckoo. Remember the capture(wpa-test-01.cap) must contain the four-way handshake to be successful. I4 E$ r7 m2 ^1 P
8 F2 W/ L7 k }6 T; S% S6 l) K$ w3 m" r/ l3 a2 G; @+ I# A1 Q
$ r/ Y' K1 t0 s; G; @0 K; o" p/ Z+ I5 u+ @! H9 }; K. `1 _6 ^' b3 X# Y
g5 g' D! V1 |7 Q( n/ v$ R, O Tcowpatty -d linksys.hashfile -r wpapsk-linksys.dump -s linksys # }2 o4 J$ ~) i- Q% f( v# c
% p2 K/ b0 q" R9 f" V+ m! `
+ {# d \& b( s, m, N
6 F+ \% [/ a) ]- z
$ f7 l: S% ?% z s# {
7 E P6 W( {# K) x+ l1 I8 d% F' k) w% |
& R1 V1 X u4 A# O
& [& w( l6 ^( j8 v8 a! L9 D' P
6 [( G" J2 g) {# }( e$ }9 ?( M' |! ]9 l" }' ]& \9 E- G
wpa-test-01.cap is the capture containing the four-way handshake
' z" z) p! F& _7 b1 k; ~' y: K
% _9 V6 {% U: N. { e2 R w8 A3 n% x7 S% K+ |1 U; ?$ V7 b' O2 `$ d
$ Z& o8 d6 d% x% g
linksys.hashfile are our precomputed hashes
" F; G: z% B, S' P. K* l# w6 \9 w
$ ?5 d( [# _) l, e; ~- I0 W6 q3 N8 y) I4 p: G/ k) D
; e- M" y* t# g+ i
& `, S0 y' U( ~3 T& Clinksys is the network ESSID
, r8 E' K' x# M% Q5 j# g; h$ A& w# b# B9 ~( @9 W7 U
+ H! o [1 |3 a8 E8 y0 l& e
% l- b h, }1 _2 k$ m$ t) l* \& }: t. f' u
# w) ?( }2 j( u# n9 x
8 Y" O+ z# v! m: v# I4 ]0 b: eNotice that cracking the WPA-PSK took 0.04 seconds with the pre-computed attacked as opposed to 200 secondswith standard dictionary attack mode, albeit you do need to pre-computethe hash files prior to the attack. However, precomputing large hashfiles for common SSIDS (e.g. linksys, tsunami) would be a sensible movefor most penetration testers.2 k9 L' r- X. P8 {$ _) I* m
' c" g" B# `4 q* ?& Q% R2 p
" k& a: p/ u. L4 |* C0 e! X/ B+ e" M1 ~# E
1 z4 O: }- l$ l- F$ O* _$ C3 _5 d( }" S6 y) E! e- k6 K. ^ e
coWPAtty Precomputed WPA2 Attack:
& ^) E. @8 ^" D3 R! M6 ~/ ^0 P$ y5 O0 Z3 d) k8 n. C; r6 e0 |+ }
coWPAtty4.0 is also capable of attacking WPA2 captures. Note: The same hashfile as was used with the WPA capture was also used with the WPA2capture.6 a( P' J' b6 o( Y( Q- t: i( I
; F- i- k* `4 Z- W9 m7 }. Z' Q! B1 S
) w9 X; [: {. W3 N" E
3 n: s/ v0 i. \ Jcowpatty -d linksys.hashfile -r wpa2psk-linksys.dump -s linksys; l. A2 h0 X' i9 ]
2 K7 H8 J7 y v+ G
% R1 c9 [# A8 q' K; G* X9 x' b# N3 J$ o* S
' A! X7 f3 F: e+ ?: U* b9 j: C$ Y- C( L0 l* q
8 N$ l1 I; W/ Y9 D7 t- H! B# h: S0 |6 {$ p$ h6 _3 }8 ?/ U4 W
) ]( q# T* L1 [3 E2 {2 J% g6 _# a! f X( K1 ?
* s: a4 l2 i9 g% \! q8 t# q( v- v0 j, N9 a1 j
wpa2psk-linksys.dump is the capture containing the four-way handshake8 i5 l2 t* h4 o
G0 R4 @7 T" ^8 G6 O8 l6 N, C/ w, B5 E7 f8 R
9 I2 j' | A/ s% H) L" H
: Z$ }1 J; b$ a7 _6 a" ndict is the password file; i8 y# n. \, L' M+ S6 Y
1 z' T3 |: n! g$ b( p6 E% `/ y: Y# I2 b
! ?: L# p5 g: q! w, x# u% D' b$ {; X' R& K! {( z! z; f1 w
linksys is the network SSID
: I z1 v# m* L
* o7 x2 x7 f" m9 U+ I0 C+ S! m& n4 m! a6 a# |; u8 }
6 u+ P3 A, d7 t% c6 l9 V _! m, M' b9 {9 @, A8 {) L# U; V" q2 Z; H
coWPAtty Tables: 6 G( T9 w# T! n2 w& V
2 I; ], f: ~. u& `4 t, P8 gThe Church of Wifi have produced some lookup tables for 1000 SSID's computed against a 170,000 word password file. The resultant table are approximately 7 Gigabytes in size and can be downloaded via Torrent:
A/ G3 a9 {* u* k \+ u ~( W) a2 a, \1 J8 N b9 v e! c+ W0 y6 }0 e. M7 k* j
. p8 w3 @8 c' R( w0 Ihttp://torrents.lostboxen.net/co ... atty-4.0_2006-10-199 }# m9 D6 A) J" k$ l1 y
( _+ F4 M3 K9 d5 d3 d! m5 F j. X8 B# W& G1 m" p
4 l% Y- E. {3 Z5 w9 B$ PA 33 Gigabyte set of tables are also available: http://umbra.shmoo.com:6969/1 P" V6 G( J9 W# X5 t1 r- Y/ R
6 J3 t- q, E; ^0 A0 Z8 l3 ]1 D9 u9 X" v
Or you can buy them via DVD, direct from Renderman (initiator of the project): http://www.renderlab.net/projects/WPA-tables/. J% }2 r' B; I6 C+ ~; ` |
|