WPA2 Cracking, Dictionary + Brute Force?

Data that travels over the air and how to protect (or decipher) it

WPA2 Cracking, Dictionary + Brute Force?

Post by limdis on Fri Sep 02, 2011 5:58 pm
([msg=61362]see WPA2 Cracking, Dictionary + Brute Force?[/msg])

Could someone shine some light on this for me?

I was reading about wireless encryption and vulnerabilities. Say for example I have a home wireless network set up with WPA2 encryption and my password is 1Nibbets!!** Now from what I have read, a common way for someone to break it is to use a dictionary attack like aircrack-ng after sending deauthentication packets and listening/saving ARP requests.

My question;
So if the attacker has “Nibblets” in his wordlist but not “1Nibbets!!**” it should fail. Is it possible because the traffic has been saved to a .cap that they could see that “Nibblets” was part of the password and then plug that in for a specific brute force attack to get the numbers and special characters? If I’m totally off on any of this please correct me.

Thank you :)

-- Sat Nov 17, 2012 9:58 am --

BAM answered my own question over a year later!
http://hashcat.net/wiki/doku.php?id=hybrid_attack
"The quieter you become, the more you are able to hear..."
"Drink all the booze, hack all the things."
User avatar
limdis
Moderator
Moderator
 
Posts: 1166
Joined: Mon Jun 28, 2010 5:45 pm
Blog: View Blog (0)


Return to Networking

Who is online

Users browsing this forum: No registered users and 0 guests