Warning: array_merge(): Argument #2 is not an array in /home1/femme/public_html/variableghz.com/wp-content/themes/destro/inc/customizer.php on line 607
August | 2011 | VariableGHz

Rss

Archives for : August2011

Is WPA/WPA2 Vulnerable to Brute Force?

Just for fun, I attempted to bruteforce my own WPA2 (“Wi-Fi Protected Access”) network using Elcomsoft Distributed Password Recovery. Since I had rather awful results in the past with *.PDFs, I thought, perhaps I would have better luck with WPA cracking. The PDF algorithm doesn’t work with GPUs, but it does work with WPA, so I thought that maybe I’d be in luck!

In order to bruteforce WPA/2, you have to capture a 4-way “handshake” (tutorial below). You can do this using BackTrack, or WireShark to listen and capture the packets to a file, specifically a *.CAP file. If you don’t capture it correctly, you won’t be able to even try cracking it. Not that this makes much of a difference…

Continue Reading >>