stuart - (cyberjackcyberjack): genpmk lol so so so sloooow much better with pyrit with gpu power much faster
M Thomas: So, this can only work if the router does not have a Firewall to automatically block a client after a certain number of connection failures. Also, some routers have a button you have to physically press in order for it to allow new connections.
odinsmeadhorn: You have to build the Genpmk lists at the same rate that you Crack with CowPatty using the library attack. It will take just as long both ways so whats the point of even using Genpmk. You build the list which takes just as long then crack in a matter of seconds. Or you just crack at the same rate that it took you to build the list. I feel like I'm taking crazy pills here.
Joseph R: Anonymus was in diccionary?
JarppaGuru: how much time take generate hashed example for 5 long key a-z0-9 when total keys would be 62193780. i testing one window program and it will try only 250keys/s and allredy run 24hour looool and not yet finished.if i had hash for it it would run 10000key/s (on linux sure) so that would take 100minutes? so how long time take make that hash file before cracking wpa?
JarppaGuru: if generating hash basically same thing than run wordlist on cowpatty. my brain says its slower? what if password is firstlines of wordlist? you take all time to make pre calculated hash. when cowpatty wud find it 2 minute anyways lol. and why do hash if you never again use it with same essid again :) my question is? genpmk+cowpatty(hash)=cowpatty (wordlist) when run million passphrases and it will last on line
fuckmanolo: Your voice reminds me Chris Griffin lol
Kaloqn Donkov: This is for silly, there is more good ways to do it, not with this fuking dictionary.
cirujatuc79: "End of pcap capture file, incomplete four-way handshake exchange, try using a different capture." :( (wifi WPA2)
m9alexz: anyone want to hack WEP ? i can teach you how just send me message :)
davidangelmorin: Where can I get software
Ik Foung Tang: Hi, May I ask If The Password didnt in the wordlist. Can it be find the WPA password successfull ?
pepin machin: What a freaked up tutorial, waste of my time
Justin Hutchens: In theory you are correct. A dictionary attack is only as good as the wordlist used. You obviously haven't looked at the darkc0de wordlist though. That and others that are commonly used these days are not composed of just a list of lower case words. They include actual passwords from password dumps, and large amounts of number, case and special character permutations. Additionally, if you are targeting a victim, you could gen up a custom wordlist with something like cupp.py
urbex2007: Pointless! This ONLY works *IF* the password is in one of the word lists on the computer. If you use a random character, mixed case and special characters, you will never crack WPA2 or even older WPA. Everyone doing this type of video will lie to get viewers, not one of them knows how to crack WPA(2). All they do is copy other videos without understanding how the software works.
Show me a proper WPA2 being cracked without the password already input on the computer ! You can't!
Tsc.ConsultingInc. Mr.: this video is not that clear! your using backtrack in a VM Machine
xbadc0de: what the freak is wrong with your voice? are you crying?
Mac Sam: Fu is for wpa only
Speed Cracking WPA & WPA2 with CowPatty and Genpmk5
out of 5