Provided by: cowpatty_4.8-3build1_amd64
cowpatty - Brute-force dictionary attack against WPA-PSK
Implementation of an offline dictionary attack against WPA/WPA2 networks using PSK-based authentication (e.g. WPA-Personal)
cowpatty < -d | -r > < HASH-FILE | CAPTURE-FILE > -f WORDLIST -s SSID
-f Dictionary file -d Hash file (genpmk) -r Packet capture file -s Network SSID (enclose in quotes if SSID includes spaces) -c Check for valid 4-way frames, does not crack -h Print this help information and exit -v Print verbose information (more -v for more verbosity) -V Print program version and exit
cowpatty was developed Joshua Wright <email@example.com>. This manual page was written by Samuel Henrique <firstname.lastname@example.org> for the Debian project, it was based on cowpatty -h output and can be used by other projects as well.
genpmk(1) aircrack-ng(1) airodump-ng(1) airmon-ng(1) wifite(1)