Thursday, January 7, 2010

Filled Under: , ,

@purehate_ Launches Online WPA Cracker : 10$ For 540 Million Passwords

@purehate_  is a backtrack Developer and penetration tester too. He recently Developed a New Online WPA Kracker. For cracking the passwords of the hashed network key is exchanged and validated in a “four-way handshake”.

 @purehate_ Launches Online WPA Cracker : 10$ For 540 Million Passwords

This tool is great as you can see it uses nearly about 540 Million passwords to crack the WPA, well i am not sure, as i am not experienced with the WPA cracking that much. But here is what it does.

 

Ok i am sorry for the name, because i was unable to Find the Name, I hope to get to know his real name. but i got a guess would be Nick as it was written in the contact page as nick pure_hate. Nevermind...

 

What exactly does service thing do?

This is a research project, not a cracking tool. WPA-PSK is vulnerable during client association, during which the hashed network key is exchanged and validated in a “four-way handshake”. In order to use this web interface you will need the “four-way handshake”.

 

2010-01-07_124002

WPA-PSK is particularly susceptible to dictionary attacks against weak passphrases and this server can greatly improve the speed of the attack. Your cap file will be tested against a list consisting of about 540 million passwords and can take up to two hours to complete.

 

A email will be sent along with the results to whichever email address you specify to the uploader.

 

 korek-progress-2

 

 

Direct Link

You Can Follow Him on twitter too @purehate_

His Website Ph33rbot.com

blog comments powered by Disqus