LinuxCommandLibrary

pyrit

Crack WPA/WPA2 wireless network passwords

TLDR

Display system cracking speed

$ pyrit benchmark
copy

List available cores
$ pyrit list_cores
copy

Set [e]SSID
$ pyrit -e "[ESSID]" create_essid
copy

[r]ead and analyze a specific packet capture file
$ pyrit -r [path/to/file.cap|path/to/file.pcap] analyze
copy

Read and [i]mport passwords to the current database
$ pyrit -i [path/to/file] [import_unique_passwords|unique_passwords|import_passwords]
copy

Exp[o]rt passwords from database to a specific file
$ pyrit -o [path/to/file] export_passwords
copy

Translate passwords with Pired Master Keys
$ pyrit batch
copy

[r]ead the capture file and crack the password
$ pyrit -r [path/to/file] attack_db
copy

SYNOPSIS

pyrit [-v] [-q] [-d ] [options]

PARAMETERS

-v
    Verbose mode; increases verbosity.

-q
    Quiet mode; suppresses output.

-d
    Specifies the database module to use (e.g., sqlite, file).

DESCRIPTION

Pyrit is a powerful tool for cracking WPA/WPA2-PSK authentication using the computational power of GPUs. It leverages CUDA or OpenCL to significantly accelerate the process of password cracking compared to CPU-based methods.

It operates by performing pre-computations on the SSID and password candidates, storing the results in a database. This allows for efficient cracking of multiple handshakes using the same SSID. Specifically, it focuses on computing Pairwise Master Keys (PMKs) and performing brute-force attacks on captured handshakes. Pyrit consists of multiple modules, each with specific functionalities, such as importing and exporting data, benchmarking performance, and performing actual cracking attempts.

Pyrit is no longer under active development. Hashcat and other tools have overtaken its utility and ease of use, particularly in modern GPU architectures.

CAVEATS

Pyrit's performance is heavily dependent on the GPU hardware. Also, support for modern GPUs may be limited, as development has ceased. It requires CUDA or OpenCL support for GPU acceleration, and the correct drivers must be installed.

MODULES

Pyrit is comprised of several modules, including:

  • import_cap: Imports captured handshake files (.cap, .pcap, .ivs).
  • export_pmk: Exports pre-computed PMKs.
  • bench: Benchmarks the GPU's performance.
  • attack_passthrough: Performs an attack using pre-computed PMKs against captured handshakes.

EXAMPLE USE

Example: pyrit -i wordlist.txt -s ESSID attack_passthrough
This command attempts to crack a WPA/WPA2 network with the ESSID ESSID using the provided wordlist file wordlist.txt

HISTORY

Pyrit was developed to accelerate WPA/WPA2-PSK cracking by utilizing the parallel processing capabilities of GPUs. It gained popularity due to its significant performance improvement over CPU-based tools. However, with the rapid evolution of GPU technology and the development of more versatile tools like Hashcat, Pyrit's usage has declined, and it is not actively maintained anymore.

SEE ALSO

aircrack-ng(1), hashcat(1), cowpatty(1)

Copied to clipboard