Offline WPA-PSK auditing tool (coWPAtty)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



A while back, Robert Moskowitz published a paper titled "Weakness in Passphrase Choice in WPA Interface" [1] that described a dictionary attack against wireless networks using the TKIP protocol with a pre-shared key (PSK).

Even though the WPA-PSK authentication mechanism was intended to be used solely for consumer networks, I've seen a surprising number of SMB and Enterprise networks that have adopted it, presumably for its ease of use.

Fortunately, offline dictionary attacks are not terribly effective against WPA-PSK networks, due to the IEEE selection of the pbkdf2 algorithm for PSK hashing. For a dictionary attack to be effective, it must take each dictionary word and perform 4096 iterations of HMAC-SHA1 with two nonce values and the supplicant and authenticator MAC addresses. I've optimized the ipad and opad calculations in an attempt to optimize this process, but I'm only able to accommodate approximately 70 words/second on a Pentium 4 3.8 GHz system (5570 bogomips).

Max Moser offered to host coWPAtty for me, available at http://www.remote-exploit.org/?page=codes. coWPAtty was written for Linux systems; please let me know if you get it running on other platforms as well. More information is available in the README and FAQ files included in the tarball.

Thanks,

-Josh

[1] http://wifinetnews.com/archives/002452.html
--
-Joshua Wright
jwright@xxxxxxxxxxx
http://home.jwu.edu/jwright/

pgpkey: http://home.jwu.edu/jwright/pgpkey.htm
fingerprint: FDA5 12FC F391 3740 E0AE BDB6 8FE2 FC0A D44B 4A73

Today I stumbled across the world's largest hotspot. The SSID is "linksys".

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux