Tuesday, September 24, 2013

WPA/WPA2 Bruteforcing Tool - Pyrit

1) Install Pyrit in Backtrack if you dont have it , here is the tutorial :  http://www.backtrack-linux.org/forums/showthread.php?t=40360

2) Get your Handshake.cap file ! Tutorial here :   http://www.aircrack-ng.org/doku.php?id=cracking_wpa

Screenshots :




Now, Follow the screenshots tutorial from 1 to 7 , make sure you replace " d4rk50ld13r-01.cap " by your Handshake file , and you have an lst wordlist file in /pentest/passwords/wordlists.
I used darkc0de.lst but you can use any wordlist file you want as longest it is placed in the right directory !

Screenshot:



No comments:

Post a Comment