Provided by: cowpatty_4.8-3build1_amd64 bug

NAME

       cowpatty - Brute-force dictionary attack against WPA-PSK

DESCRIPTION

       Implementation  of  an offline dictionary attack against WPA/WPA2 networks using PSK-based
       authentication (e.g. WPA-Personal)

SYNOPSIS

        cowpatty < -d | -r > < HASH-FILE | CAPTURE-FILE > -f WORDLIST -s SSID

OPTIONS

       -f     Dictionary file

       -d     Hash file (genpmk)

       -r     Packet capture file

       -s     Network SSID (enclose in quotes if SSID includes spaces)

       -c     Check for valid 4-way frames, does not crack

       -h     Print this help information and exit

       -v     Print verbose information (more -v for more verbosity)

       -V     Print program version and exit

AUTHOR

       cowpatty was developed Joshua Wright <jwright@hwillhackforsushi.com>.

       This manual page was written by Samuel  Henrique  <samueloph@debian.org>  for  the  Debian
       project, it was based on cowpatty -h output and can be used by other projects as well.

SEE ALSO

       genpmk(1)
       aircrack-ng(1)
       airodump-ng(1)
       airmon-ng(1)
       wifite(1)