We can proceed with the following steps:
genpmk
tool with the following command:genpmk –f <chosen wordlist>–d PMK-Wireless-Lab –s "Wireless Lab
This creates the PMK-Wireless-Lab file containing the pregenerated PMK:
abcdefgh
(present in the dictionary we used) and capture a WPA-handshake for that network. We now use Cowpatty
to crack the WPA passphrase, as shown in the following screenshot:It takes approximately 7.18 seconds for Cowpatty
to crack the key, using the precalculated PMKs.
aircrack-ng
with the same dictionary file, and the cracking process takes over 22 minutes. This shows how much we are gaining because of the precalculation.aircrack-ng
, we need to use a tool called airolib-ng
. We will give it the options airolib-ng
, PMK-Aircrack --import
,and cowpatty PMK-Wireless-Lab
, where PMK-Aircrack
is the aircrack-ng
compatible database to be created and PMK-Wireless-Lab is the genpmk
compliant PMK database that we created previously.aircrack-ng
and the cracking process speeds up remarkably. We use the following command:aircrack-ng –r PMK-Aircrack WPACrackingDemo2-01.cap
pcap
filename with the -r
option and the genpmk
compliant PMK file with the -i
option. Even on the same system used with the previous tools, Pyrit takes around 3 seconds to crack the key, using the same PMK file created using genpmk
.