SHARE
TWEET

Untitled

a guest Sep 14th, 2017 165 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. jjculber@255x13:/tmp2/jjculber/cowpatty-CUDA $ genpmk -f one.dict -d out2.rt -s linksys
  2. genpmk 1.1 - WPA-PSK precomputation attack. <jwright@hasborg.com>
  3. File out2.rt does not exist, creating.
  4. There are 1 passphrases
  5. size of pmk = 32
  6. performing pbkdf2_sha1 where buflen = 32, maclen = 20.
  7. PMK is
  8.      7065 2051 da77 ce8b a165 960c e271 93bf  pe Q.w...e...q..
  9.      c2dd 412a 2639 a228 1641 d17f cacb 55dc  ..A*&9.(.A....U.
  10.                                              
  11.  
  12. 1 passphrases tested in 0.00 seconds:  223.91 passphrases/second
  13. jjculber@255x13:/tmp2/jjculber/cowpatty-CUDA $ ./polar/a.out
  14.  
  15. Test A: 'abc'
  16.     A9993E364706816ABA3E25717850C26C9CD0D89D
  17. Should match:
  18.     A9993E364706816ABA3E25717850C26C9CD0D89D
  19.  
  20. Test CUDA: pass: "11111111", ssid: "linksys"
  21. 70652051DA77CE8BA165960CE27193BFC2DD412A2639A2281641D17FCACB55DC
  22. Should match:
  23. 70652051da77ce8ba165960ce27193bfc2dd412a2639a2281641d17fcacb55dc
  24. jjculber@255x13:/tmp2/jjculber/cowpatty-CUDA $
RAW Paste Data
Top