top of page
Search
  • kortney61wei

Dictionnaire Backtrack 5 WPA2: Learn the Vulnerabilities of WPA and WPA2 Protocols



hi guys,i am a new user in learning and i studied from google and i decided to use Kali then i create a bootable usb with Linux. I used both dictionaries those are pure in backtrack one of them is rockyou.txt and other is also large more than 133 mb.but my passwords not found.now i have downloaded big wpa1 and 2 and 3. Can anyone sure by using these dictionaries you will be 100% able to find passwords or not?if not then what to do now?please seniors help us we are learning for education purpose only


Hi, somebody, I am using Linux and i have yet to do crack wpa2. but,i use a rockyou.txt file is not working or no enough for me. cant found key for wpa2. so, how can i do? need ext that file or need download another big dict once?my rock you.txt is only 133 mb and i need to known enough or not. if need to ext, tell me how to do and need download another, teach me where can i get it every one.




dictionnaire backtrack 5 wpa2



The default storage for a WPA handshake is under /root and will be there under what ever name you called it. The dictionary that we will use is built into backtrack under the /pentest/passwords/wordlists and is called darkc0de.lst.(Be sure to use the number 0 in darkc0de.lst)


Ive reached all the way to the end, but when I try to run cowpatty I get "End of pcap capture file, incomplete four-way exchange. Try using a different capture". Does this mean i have to redo the process? I am sure i got the hand shake, ive tried both methods, waiting for someone to conmect and by deauthenticating them. Both timess it said I got the handshake on the top left and it was on the correct bssid adress. What should I do. I also noticed the command "-c" "check for valid 4-way frames, does not crack". How do I use this and can this help me? What should I do. Using backtrack5r3


Backtrack 5 R3 is a notorious Digital Forensic and Intrusion Detection software bundle with a whole lot of tools for Penetration Testing, It is based on Linux and includes 300 plus tools.If you have never used Backtrack before all you really need to know it is the best software to use for Digital Forensics, Intrusion Detection and Penetration Testing.There are different types of wireless attacks but in reality only two main types are used. I will go step by step through each. If you have Backtrack 5 installed the first chapter can be skipped directly to the hack you would like to use.The two main types of wireless hacks are WPA dictionary attack, and Reaver.In the past WEP used to be the main encryption used on routers but WEP was notoriously easy to crack and is rarely seen any more. WPA or WPA2, which are really the same thing, are the way in which routers are now encrypted and much harder to crack.The way you think about these attacks are as important as the attacks themselves. There is no point and click option. Learning commands and typing them in a terminal window is a must.Buying multiple routers to play with is also a good idea. There are plenty to be found at yard sales and swap meets on the cheap. Different manufactures do different things and have different setups so some have a weakness another will not.One thing to mention also is that a internal wireless network adapter will not work with Backtrack and wireless penetration testing. This is not because the adapter is not supported it may or may not be. It is because most wireless chipsets do not support packet injections or the things required to do a wireless attack.The most common wireless USB adapter currently used are the Alfa AWUS036H and the Alfa AWUS036NH. I have used both and both are good, but if possible get the Alfa AWUS036NH because it supports wireless N. While the Alfa AWUS036H supports wireless G.To see a updated list go here www.wirelesshack.org/backtrack-compatible-adapters


Any existing Operating System will be wiped out and only Backtrack will be installed if this is done. For this reason I do not recommend installing to the hard drive unless you have done this before.Backtrack can be setup to dual boot along with an existing Operating System, but explaining how to do a dual boot is more advanced. If something goes wrong the existing Operating System will be gone or damaged.If you don't understand Operating Systems, use the other options, boot from the DVD but do not install Backtrack, or run Backtrack with VMware.The ISO will be needed to be burned to a DVD to install to the hard drive. This is the same as the above booting off the DVD. Once Backtrack is in the GUI there is a file Backtrack.sh on the desktop. Double clicking this will install backtrack to the hard drive.


You should already have a WPA handshake file and Backtrack 5 running.The default storage for a WPA handshake is under /root and will be there under whatever name you called it. The dictionary that we will use is built into backtrack under the /pentest/passwords/wordlists and is called darkc0de.lst.Getting a good dictionary can be hard there are some dictionaries within Backtrack 5 that I will use to explain the Brute Force method but there size is limited making them useless against all but the easiest passphrase.We will be using aircrack to do the cracking and the command to do this is:aircrack-ng (file name) -w (dictionary location)Where the file name is the handshake file you captured and the dictionary location is the path to your dictionary. The location of where this two files are and their names will be up to you. as I said above the usual default location of the handshake file is under /root and is whatever you called it. We will be using the darkc0de.lst dictionary for this example under the /pentest/passwords/wordlists directory.So the command for me to do this would be:aircrack-ng /root/mywpacatch-05.cap -w /pentest/passwords/wordlists/darkc0de.lstIf done right aircrack should start and begin to try to crack the WPA handshake capture with the dictionary.


Just thought i would share the link for those who are looking for a decent list to pen test their networks.The list contains 982,963,904 words exactly no dupes and all optimized for wpa/wpa2. Would also just like to point out that this is not my work, instead it was a guy who compiled a whole load of useful lists, including his own to come up with 2 lists (one is 11gb and one is 2gb) i will be seeding this torrent indefinitely since it is shareware! 20mb up!INFO


Not read this post in a while and am so glad all you guys got the use out of this. I thought i was setting it indefinitely but for some reason my utorrent crapped out, working on re adding the torrent without having to download it again. Also i would suggest using pyrit in kali / backtrack for using this list, or as shuttin mentioned aircrack might actually support a word list this size now. I am going to be testing this word list using kali linux, i'll post the commands pkms etc to give you guys and idea of just what works best.


A2 Aircrack-ng only supports files up to 2gb Max ! so i would use Pyrit in backtrack and ditch aircrack-ng, its a little outdated. and pyrit can use GPU for more speed far more than most CPU could ever hope to accumpish.


They are different linux distributions, but both released and maintained by Offensive Security. Backtrack is based on Ubuntu, while Kali is a newer release based upon Debian linux. This tutorial is not an OS tutorial, but an application tutorial. It will work on most linux-distributions, as long as you have the aircrack-ng package installed, and a compatible wifi-card. So the answer is yes, this tutorial can be used on backtrack 5, since aircrack is installed by default in both Kali and backtrack. 2ff7e9595c


10 views0 comments

Recent Posts

See All
bottom of page