cowpatty
TLDR
Dictionary attack on capture file
SYNOPSIS
cowpatty [options]
DESCRIPTION
cowpatty is a WPA/WPA2 PSK auditing tool that performs offline dictionary attacks against captured authentication handshakes. It's used for authorized wireless security testing.
The tool processes four-way handshake captures and tests passphrases against the captured authentication exchange. Precomputed hash tables can dramatically speed up testing for common SSIDs.
PARAMETERS
-f file
Dictionary file with passphrases.-d file
Precomputed hash table file.-r file
Packet capture file.-s ssid
Network SSID (required).-p pass
Single passphrase to test.-c
Check for valid handshake only.-v
Verbose output.-2
Use frames 1 and 2 or 2 and 3.
CAVEATS
Requires valid captured handshake. Only for authorized security testing. SSID-specific hash tables needed for each network. Dictionary attack limited by wordlist quality.
HISTORY
cowpatty was created by Joshua Wright around 2004 for WPA security research. It was one of the first public tools for WPA PSK auditing, demonstrating the importance of strong passphrases. The tool influenced subsequent wireless security tools like aircrack-ng.
SEE ALSO
aircrack-ng(1), genpmk(1), hashcat(1), wifite(1)


