LinuxCommandLibrary

cowpatty

TLDR

Dictionary attack on capture file

$ cowpatty -f [wordlist.txt] -r [capture.cap] -s [SSID]
copy
Use precomputed hash table
$ cowpatty -d [hashfile] -r [capture.cap] -s [SSID]
copy
Generate hash table
$ genpmk -f [wordlist.txt] -d [hashfile] -s [SSID]
copy
Check single passphrase
$ cowpatty -r [capture.cap] -s [SSID] -p "[passphrase]"
copy

SYNOPSIS

cowpatty [options]

DESCRIPTION

cowpatty is a WPA/WPA2 PSK auditing tool that performs offline dictionary attacks against captured authentication handshakes. It's used for authorized wireless security testing.
The tool processes four-way handshake captures and tests passphrases against the captured authentication exchange. Precomputed hash tables can dramatically speed up testing for common SSIDs.

PARAMETERS

-f file

Dictionary file with passphrases.
-d file
Precomputed hash table file.
-r file
Packet capture file.
-s ssid
Network SSID (required).
-p pass
Single passphrase to test.
-c
Check for valid handshake only.
-v
Verbose output.
-2
Use frames 1 and 2 or 2 and 3.

CAVEATS

Requires valid captured handshake. Only for authorized security testing. SSID-specific hash tables needed for each network. Dictionary attack limited by wordlist quality.

HISTORY

cowpatty was created by Joshua Wright around 2004 for WPA security research. It was one of the first public tools for WPA PSK auditing, demonstrating the importance of strong passphrases. The tool influenced subsequent wireless security tools like aircrack-ng.

SEE ALSO

aircrack-ng(1), genpmk(1), hashcat(1), wifite(1)

Copied to clipboard