RWSPS: Crack WPA2-PSK Using Pre generated PMKs [ch5pt1]

rootsh3ll-speed-up-wpa-psk-cracking-with-pregenerated-pmk-cowpatty-pyrit-rwsps

Hello and welcome to the part 1 of Chapter 5 from the rootsh3ll WiFi Security and Pentesting Series.

If you are following the series from the very beginning you must be familiar with the Handshake we captured and used it with a Wordlist to crack the WPA2-PSK. As there is a tremendous possibility for WPA2 passphrases as they can be AlphaNumeric including special characters that too with 8-63 characters long. There is practically no limit to the wordlist we could create, They can reach Even PetaBytes in size which will take time till next Big Bang for the CPU/GPU to crack the correct passphrase, if it is a strong one.

So, we need to discover various ways to crack the WPA2-PSK within a short span of time. Which is possible if we somehow get the PSK via router panel, keylogger or use a GPU instead of CPU to use it’s multiple cores to boost cracking speed, or something even different.

That is what we will learn in this chapter. We will boost the WPA2 cracking speed without using any GPU or Cloud. Which can be very useful with the AP’s with very common name like “Airtel“, “MTNL“, “Belkin” etc.

WPA2 cracking is dependent on SSID and passphrase that means that if there are 2 access points with different SSID but same Passphrase, there PMK will be completely different.

Checkout my new store for Best WiFi adapters for Hacking, Best-selling Pentesting Books and Best WiFi Boosters: Rootsh3ll rStore

What is PMK ?

The 256 Bit value derived by the PBKDF2 function using the SSID, Passphrase(PSK) as the differentiating factors used for authenticating between the AP and the Client. It will look like this:

Aircrack-ng-Pairwise-master-keyDo some math,

These are 32 HexaDecimal values, every HexaDecimal values takes 8 bit, so 32*8 = 256 Bit, which is th PMK i.e 256-Bit key

We can also cross check this without cracking the key with aircrack-ng.

By using wpa_passphrase command that comes pre-installed on almost every *nix distribution.

Open terminal and type:

  • wpa_passphrase <SSID> <Passphrase>

We need to insert SSID along with Passphrase because as told earlier WPA2-PSK is SSID dependent, it changes completely with a slight change in SSID. Now,

Here’s the output, compare the highlighted value with the value of Master Key above:

Wpa-passphrase-pmk-check-rootsh3ll

Yes, it’s exactly the same. So here is the confirmation that PMK we calculated and the PMK aircrack-ng calculated for a specific SSID and Passphrase is the same. Now we will see how to boost the speed.

Content of this chapter will go like this:

  • Introduction:
    • CoWPAtty
    • Pyrit
  • Installation:
    • CoWPAtty from Source code
    • Pyrit from Source code
  • Generate PMKs:
    • Using GenPMK, Included in CoWPAtty (Single-threaded)
    • Using Pyrit (Multi-threaded)
  • Cracking PSK(Pre-Shared Key):
    • With PMKs [ CoWPAtty vs. Aircrack-ng ]
    • [ EXTRA! ] Pyrit + CoWPAtty Stdin

Introduction:

 

What is CoWPAtty ?

CoWPAtty is a free command line tool that automates the dictionary attack for WPA-PSK. It runs on Linux. It is an implementation of an offline dictionary attack against WPA/WPA2 networks using PSK-based authentication. CoWPAtty take 2 types of input to crack WPA-PSK i.e

  1. Standard Wordlist
  2. Pre-generated PMKs or Hash

CoWPAtty comes pre-installed in Kali Linux.

CoWPAtty can be downloaded from www.willhackforsushi.com.

What is Pyrit ?

Pyrit is a tool written in Python that allows you to create massive databases, pre-compute the WPA2-PSK to save time. This technique is called space-time-tradeoff. Pyrit supports both CPU and GPU. for using GPU you need to install supported graphics driver.

Pyrit comes pre-installed in Kali Linux. Pyrit can be downloaded from https://github.com/JPaulMora/Pyrit

What is space-time-tradeoff ?

If you remember in one of the previous chapters we cracked the WPA2 passphrase using aircrack-ng by passing it a wordlist, which supposedly  contained the actual passphrase. Which is not likely to be possible with most of the times as wordlist have no limit, passphrase can be in any dictionary we have chosen or cannot be in the dictionary, we as a penetration tester just don’t know and also the cracking speed for the WPA2-PSK is very low so we need to speed up the process some how. This is where space-time tradeoff comes into picture.

What we actually do is we pre-compute the PMK(Pairwise Master Key) with corresponding SSID and store it on a hard drive and we can use it at anytime with the Cap file for the same SSID, as WPA2-PSK is SSID and Password sensitive. As we have pre-computed the PMKs and stored on our hard drive, it is just like a lookup for the system into the table which doesn’t take much time and cracking speed are very high, saving us a lot of time.

Only condition is there must be a Pre-computed file with same SSID and different passphrases picked from a wordlist. Although even this doesn’t guarantee cracking the PSK but cracking speed is significantly higher than any CPU or GPU, that we will see in this tutorial.

Installing CoWPAtty from Source code

Open terminal and type:

 

Installing Pyrit from Source code

Open terminal and type:

Generate PMKs Using GenPMK

GenPMK is a tool which installs along with cowpatty as a substitute for generating the hash file(PMKs) and allowing coWPAtty to crack WPA2-PSK at higher speeds.

Let’s see how to create PMKs using GenPMK.

Open terminal and type:

  • genpmk -f  “wordlist” -d “output_filename” -s “SSID”

Now you should a similar output

genpmk-generate-pmk

NOTE: GENPMK_rootsh3ll didn’t exist, so genpmk created a new file. In case the file already exists, the hashes will be appended to the existing file.

Now wait for genpmk to finish creating PMKs. and it will show you the average speed (Passphrases/sec) at which it generated PMKs. Mine was

As I have told already, GenPMK is a singlethreaded program. Here you can see that while running GenPMK only one core was used to 100%

cowpatty-genpmk-single-core-usage

Now let’s move on to Creating PMKs using Pyrit.

Generate PMKs Using Pyrit

Open terminal and type:

  • pyrit  -o “Output_filename” -i “Wordlist” -e “SSID” passthrough

If you notice, options required are still the same we have just changed the output filename with a prefix “PYRIT” to distinguish the PMKs generated using Pyrit and GenPMK.

passthrough is an option in pyrit used to create the PMKs from the passphrase taken from the dictionary at a moment. Speed is comparitively high from GenPMK. Notice and compare the speed in the image below.

pyrit-generate-pmk

See the difference,

363.99 vs. 2089. why ? because GenPMK is a single threaded program whereas Pyrit is a tool that utilizes full power of the CPU i.e either 4 cores or 8 cores, pyrit will get the maximum power. Which is what makes it better option to chose for generating PMKs over GenPMK.

See the CPU usage while Pyrit was generating PMKs:

pyrit-full-cpu

Now let’s begin the PSK cracking.

Crack WPA2-Pre Shared Key [ CoWPAtty vs. Aircrack-ng ]

It would be better if we first check the aircrack-ng’s cracking speed on this system and then notice a boost in speed using CoWPAtty.

Cracking WPA2-PSK with Aircrack-ng

Requirements:

  • 4-way EAPoL Handshake (Pcap file)
  • Wordlist (8-63 character length)

In this example I have kept real password at the end of the file and checked the maximum speed aircrack-ng reached while cracking the PSK.

Go to Desktop, where Pcap file and wordlists are located. Open terminal and Simply type

  • aircrack-ng -w <wordlist> <Pcap file>

Notice the speed:

Aircrack-ng-cracking-speed-dictionary-attack

1708.09 Keys/sec, that’s what aircrack-ng reached at max on my system(i5, 2.5 GHz).

Now we will use the pre computed PMKs with CoWPAtty and see the difference in speed

NOTE: There is no GPU involved in generation of PMKs or cracking of Key at any step.

Open terminal and type:

  • cowpatty -d <Hash File> -r <Pcap file> -s <SSID>

You can also use GENPMK_rootsh3ll, both are same. I am using PYRIT_rootsh3ll because it contains more passphrases(PMKs) due to the higher calculation speed of Pyrit.

cowpatty-genpmk-cracking-speed-boost

See the difference, same system, same RAM, no GPU included and almost 12,676% of boost in speed.

Aircrack-ng: 1708 Passphrases/second

Cowpatty with pre-generated PMK: 216521 Passphrases/second

This has been possible just because we had pre-computed Keys and what coWPAtty had to do is just loopup the hash file, No calculations involved.

We have already learned in the one of the starting chapters of the series that the most crucial part of the WPA2-PSK cracking is the PBKDF2 function which goes like this:

PBKDF2(Passphrase, SSID, ssidLen, 4096, 256)

PBKDF2 stands for Password Based Key Derivation Function which uses a Passphrase and an SSID, length of SSID(9 for ‘rootsh3ll’) iterates 4096 times for each passphrase, hashing with SHA1 algorithm and come out with a 256-bit key that is called the PMK.

One passwords takes 4096 CPU Iterations to come out with the 256-bit PSK. Imagine a wordlist containing 1 million passphrases. How many CPU cycles will it take for that wordlist to process and generate the PMKs ? 4,096,000,000 that’s 4 billion iterations for 1 million words. Even 1 million words are nothing Dictionary sizes go way beyon GigaBytes, or TeraBytes.

This is why we get very less cracking speeds as compared to MD5, SHA1 Hash cracking.

 

[ EXTRA! ] Pyrit + CoWPAtty Stdin

 

Now, We have learned to separately create PMKs and using it with coWPAtty to boost the cracking speeds. Here is one method, which doesn’t improves the speed compared to aircrack-ng but is very interesting to learn and see the working of the commands as well as the terminal, since this series is for beginners this thing is a worthwhile.

Here what we are going to do is

  1. We will pass a dictionary(8-63 Char length) to pyrit and tell it to generate the PMKs and
  2. We will not write the output to a file rather passing it to CoWPAtty.
  3. CoWPAtty will recieve PMKs as a stdin(standard input) and
  4. cracking will begin

You can see this as a sophisticated version of cracking with aircrack-ng as in aircrack-ng we just pass the cap file and dictionary. This will be quite long and deep in terms of understanding.

Let’s begin

Here is the command:

Yes, this might seem very confusing if you are a beginner in the Linux world. You need to understand the command. Let’s break it to make it simple and easy to understand.

‘|’ : Pipeline operator

This is a Linux shell’s operator used to pipe one commands output to another(right hand side) i.e after the operator.

What we did is we passed the output of the pyrit command to the coWPAtty in realtime and coWPAtty is executing at the same time and trying to crack the passphrase.

If you notice, you would see that Before and After Pipeline both are the same commands we used above with just one difference.

We neither used any output filename with Pyrit(PYRIT_rootsh3ll previously), Nor input file for Cowpatty with -d option that is for hash file(see coWPAtty help menu).

So what did we do ?

We used another Linux Shell’s feature to store the input in the STDIN(STaNdard INput) and recieve it at the same time from STDIN. This is done by using ‘-‘ operator. This operator works as STDIN when we have to direct some output to/from a file. i.e writing to Hash file with pyrit and taking input from Hash file with CoWPAtty.

So, if you notice we replaced both the filenames with ‘-‘ that simply means Pyrit will write the calculated PMKs to Standard Input and the output will be passed using ‘|’ operator to the coWPAtty command. Now at the very same moment at which coWPAtty starts reveiving the Input from the STDIN, as told to ‘-d’ option, CoWPAtty will take the calculated PMKs from the STDIN and start cracking the PSK. If  PMK matched the passphrase will be found, else try other dictionaries and keep going.

This is what it will look like when executed:

pyrit-with-cowpatty-command-line-passthrough-pipeline-wpa-psk-cracking

Speed is almost similar to what aircrack-ng was calculating at because PMKs are being calculated at realtime and being passed to coWPAtty. CPU is being consumed!

Hope you got a better insight of what happens while cracking and speeding up the whole process.

There is one thing I would like you to have a look at: Airolib-ng to speed up Cracking process

Do some research and testing and let me know what were your results in speed or what problems you faced during the above tutorial or Airolib-ng.

There is a lot more interesting stuff coming in next tutorials. so Stay Tuned!

Thanks for being till the very end of this tutorial!

See you at next part of Chapter 5!

Keep Learning!

 

Useful Links:

Router:

TP-LINK TL-MR3420 300 MB/s Wireless Router 2x 5dBi antennas

Network Adapters:

Alfa AWUSO36NH High Gain B/G/N USB / Alfa AWUS036NHA B/G/N USB

High Gain Antenna:

Alfa 9dBi WiFi Omni-Directional High-Gain Antenna

USB Drive (32 GB):

SanDisk Ultra Fit  USB 3.0  32GB Pen Drive

Graphics Card

nVidia: GeForce GTX TITAN X 12GB (BEST single GPU for Cracking)

AMD: Radeon HD 6990 830M 4 GB (3X HD6990 equivalent to 1x-Titan X) [Cheap]

 

 

468
  • rkvothe

    I’m loving these, learnt something new with this one. Thanks, mate! Keep up the good work.

    • Thanks rkvothe, Glad I could help.
      Stay tuned for more. GPU cracking is the next! 😉

      • rvkothe

        Great! Looking forward to it.

        Can I get some troubleshooting?

        I’m trying to generate a hash with pyrit and I keep getting this

        IOError: [Errno 2] No such file or directory: ‘eight’

        Do you know what’s up with that?

        • rkvothe

          Nevermind! I’m an idiot. Don’t allow that post through 😛

        • Well, It’s an Input error as specified:
          IOError: [Errno 2] No such file or directory:
          check for the spellings or the file : “eight”

          Thanks for the feedback rvkothe 🙂

  • SaHil

    Thanks you for this, now i am cracking more faster 🙂

    Again thx

    • You are always welcome SaHil 🙂

  • Thanks i appreciate very much ; and i share it on my page

    again thanks

  • Strangerz Hero

    wonderful tutorial… as a i am very beginner to this hacking world, i might like to ask you some questions regarding it. what if there are two wireless in my neighbourhood with same ssids for instance ‘DLINK’ and hence if i want to crack one of the two by generating PMKs then the real question is that How this tool suppose to know which one is cracking since you taught us that ” WPA2 cracking is dependent on SSID and passphrase that means that if there are 2 access points with different SSID but same Passphrase, there PMK will be completely different “….
    and thanks in advance

    • Thanks for appreciation mate 🙂

      You will capture the handshake of distinct handshake using the access point’s MAC (BSSID), using –bssid option.
      Since ESSID can be same but not BSSIDs, as AP’s MAC is always unique.

      Regarding the cracking part, ESSID and Password is required by the tool to calculate the WPA2 hash to compare with the captured hash.

      See “Master Key” in aircrack-ng output and compare the string with the psk generated with wpa_passphrase command (wpa_passphrase ESSID Password)

      • Strangerz Hero

        Suppose if i want to crack certain wpa2 password for the first time so can i use the above depicted superfast method since i don’t have the password or it’s totally the other way…. if the answer is NO, can you tell me the best way to crack it without using GPU or Evil twin method since my test AP doesn’t use WPS.
        yet my words are not enough how much i appreciate your reply.

        • Sorry to say but there is no such best way to crack WPA2. It ultimately depends under the scenario in which you are working, hence there are a lot of methods, for you to make an appropriate choice.

          As you said your target AP doesn’t use WPS, you can still use Evil twin method to test it.
          In your scenario Evil twin method can be a life-saver.

          Also I am about to write an article on a further deeper exploitation of this method to hack multiple AP’s passwords with single evil twin AP.

          Stay Tuned!

          🙂

          • Strangerz Hero

            Does this imply that i can use “pre-generated PMK” method for any AP.

          • Yes. But it is only advisable and effective when you use it on the famous ESSIDs like NETGEAR, Belkin, Airtel etc. This is how the invested time to generate the PMKs can be leveraged over multiple ESSIDs(handshakes) to try cracking passwords in significantly lesser time.

  • Michael Khan

    Hi
    i have a question regarding using GPU.based pyrit.
    – If i want to use GPU based pyrit do i have to follow the same command line that is used for CPU based Pyrit ?
    – Does GPU based Pyrit function same as CPU based one for instance like pre-generating PMKs in the first-half
    and then lets Cowpatty do the rest ?

    and keep the brilliant work….

    • – Yes, command line is same. Pyrit + GPU driver takes care of everything
      – Works the same. See pyrit list_cores

      and Thanks! 🙂

  • Michael Khan

    Hi
    ” Normally we know, when computer crack a password, computer computes a word, generates the hash, then compares to see if there is a match. If there is, the password is correct; if not, it will keep guessing ” quoted from Null-byte. Thereby we can conclude that standard hash file (password hash) to which computer compares other hashes is already there beforehand.so Ultimately, my real questions is What we can do to grab that password hash ? because i’ve read on the net that rainbow table can crack wpa2 hash by comparing it with huge files of hashes with much better speed.

    • Above method is actually comparing the WPA2 hashes with the hash stored in the PMK file. But if you look at the header if the file you’ll notice that it isn’t clearly an ASCII type text. that’s already encoded to boost the performance by reducing CPU cycles.

      Cracking WPA2 like a rainbow table is probably a bad idea since the beginning of WPA2 as rainbow tables are simply created by the text string, but here in WPA2 you’ll get 2 different hashes for same password, as SSID is also involved in the process. which makes it even more difficult to crack.

      If you still want to create a rainbow table you can write a shell script around the command:
      wpa_passphrase [Passphrase] | grep psk

      Ex: wpa_passphrase rootsh3ll iamrootsh3ll | grep psk
      Output:
      #psk=”iamrootsh3ll”
      psk=1f4b02fe4c82f4e0262e6097e7bad1f19283b6687f084f73331db86c62498b40

      The string “1f4b….b40” is the same as the “Master Key” in the aircrack-ng output.

      Most importantly, I am leaving the “filtering WPA2 master key from .cap file” part up to you as an exercise.
      HINT: Use wireshark as GUI, or tshark as cmdline utility to automate script.

      Just compare both text strings and it’s your rainbow table for WPA2.

Shares
Share This