Advertisement
Guest User

Untitled

a guest
Sep 14th, 2017
502
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.94 KB | None | 0 0
  1. jjculber@255x13:/tmp2/jjculber/cowpatty-CUDA $ genpmk -f one.dict -d out2.rt -s linksys
  2. genpmk 1.1 - WPA-PSK precomputation attack. <jwright@hasborg.com>
  3. File out2.rt does not exist, creating.
  4. There are 1 passphrases
  5. size of pmk = 32
  6. performing pbkdf2_sha1 where buflen = 32, maclen = 20.
  7. PMK is
  8. 7065 2051 da77 ce8b a165 960c e271 93bf pe Q.w...e...q..
  9. c2dd 412a 2639 a228 1641 d17f cacb 55dc ..A*&9.(.A....U.
  10.  
  11.  
  12. 1 passphrases tested in 0.00 seconds: 223.91 passphrases/second
  13. jjculber@255x13:/tmp2/jjculber/cowpatty-CUDA $ ./polar/a.out
  14.  
  15. Test A: 'abc'
  16. A9993E364706816ABA3E25717850C26C9CD0D89D
  17. Should match:
  18. A9993E364706816ABA3E25717850C26C9CD0D89D
  19.  
  20. Test CUDA: pass: "11111111", ssid: "linksys"
  21. 70652051DA77CE8BA165960CE27193BFC2DD412A2639A2281641D17FCACB55DC
  22. Should match:
  23. 70652051da77ce8ba165960ce27193bfc2dd412a2639a2281641d17fcacb55dc
  24. jjculber@255x13:/tmp2/jjculber/cowpatty-CUDA $
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement