@purehate_ is a backtrack Developer and penetration tester too. He recently Developed a New Online WPA Kracker. For cracking the passwords of the hashed network key is exchanged and validated in a “four-way handshake”.
This tool is great as you can see it uses nearly about 540 Million passwords to crack the WPA, well i am not sure, as i am not experienced with the WPA cracking that much. But here is what it does.
Ok i am sorry for the name, because i was unable to Find the Name, I hope to get to know his real name. but i got a guess would be Nick as it was written in the contact page as nick pure_hate. Nevermind...
What exactly does service thing do?
This is a research project, not a cracking tool. WPA-PSK is vulnerable during client association, during which the hashed network key is exchanged and validated in a “four-way handshake”. In order to use this web interface you will need the “four-way handshake”.
WPA-PSK is particularly susceptible to dictionary attacks against weak passphrases and this server can greatly improve the speed of the attack. Your cap file will be tested against a list consisting of about 540 million passwords and can take up to two hours to complete.
A email will be sent along with the results to whichever email address you specify to the uploader.
You Can Follow Him on twitter too @purehate_
His Website Ph33rbot.com