Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- jjculber@255x13:/tmp2/jjculber/cowpatty-CUDA $ genpmk -f one.dict -d out2.rt -s linksys
- genpmk 1.1 - WPA-PSK precomputation attack. <jwright@hasborg.com>
- File out2.rt does not exist, creating.
- There are 1 passphrases
- size of pmk = 32
- performing pbkdf2_sha1 where buflen = 32, maclen = 20.
- PMK is
- 7065 2051 da77 ce8b a165 960c e271 93bf pe Q.w...e...q..
- c2dd 412a 2639 a228 1641 d17f cacb 55dc ..A*&9.(.A....U.
- 1 passphrases tested in 0.00 seconds: 223.91 passphrases/second
- jjculber@255x13:/tmp2/jjculber/cowpatty-CUDA $ ./polar/a.out
- Test A: 'abc'
- A9993E364706816ABA3E25717850C26C9CD0D89D
- Should match:
- A9993E364706816ABA3E25717850C26C9CD0D89D
- Test CUDA: pass: "11111111", ssid: "linksys"
- 70652051DA77CE8BA165960CE27193BFC2DD412A2639A2281641D17FCACB55DC
- Should match:
- 70652051da77ce8ba165960ce27193bfc2dd412a2639a2281641d17fcacb55dc
- jjculber@255x13:/tmp2/jjculber/cowpatty-CUDA $
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement