1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
|
Source: cowpatty
Section: net
Priority: optional
Maintainer: Debian Security Tools <team+pkg-security@tracker.debian.org>
Uploaders: Samuel Henrique <samueloph@debian.org>
Build-Depends: debhelper (>= 11),
libpcap-dev,
libssl-dev
Standards-Version: 4.2.1
Homepage: http://www.willhackforsushi.com/?page_id=50
Vcs-Browser: https://salsa.debian.org/pkg-security-team/cowpatty
Vcs-Git: https://salsa.debian.org/pkg-security-team/cowpatty.git
Package: cowpatty
Architecture: any
Depends: ${misc:Depends},
${shlibs:Depends}
Description: Brute-force WPA dictionary attack
If you are auditing WPA-PSK or WPA2-PSK networks, you can use
this tool to identify weak passphrases that were used to generate the
PMK. Supply a libpcap capture file that includes the 4-way handshake, a
dictionary file of passphrases to guess with, and the SSID for the
network.
|