Below is a bunch of ways to inter-operate between pyrit/cowpatty/jtr with various attacking and exporting techniques. I recently figured these out while having to juggle all kinds of cracking issues. A few weeks ago I was performing a wireless pentest and came up across a rather standard WPA PSK network. However, this came with issues that spawned into learning a bunch of new command line usages for various tools in conjunction with one another.
For the end goal of a simple WPA key retrieval. The issue I was having which required me to expand my wireless toolset was that programs across various operating systems were behaving differently or just plain not working at all. For example my cracker of choice is generally CowPatty but for some reason and I hope one of the readers on this blog can tell me why, CowPatty was behaving differently between my OSX, Standard Linux distro and my BT4 R2 Vmware. This is also the reason for the last post on GPU CUDA via OSX. So below are various ways to use different programs for WPA cracking related gymnastics of sorts.
Standard Cracking:
Firstly we have our standard way of cracking WPA, we can use CowPatty to determine if we have a handshake and then crack the password.
Check if we have a handshake with –c option:
cowpatty -r Capture.cap -c -s SSID
cowpatty 4.6 - WPA-PSK dictionary attack.
Collected all necessary data to mount crack against WPA/PSK passphrase
Try to Crack the password:
Now if we are sure we have a valid handshake we can crack the hash with a dictionary file. Using the following cmdline.
cowpatty -r Capture.cap -f dictionary.txt -s SSID
Starting dictionary attack. Please be patient.
key no. 1000: Anglo-spanish
Unable to identify the PSK from the dictionary file. Try expanding your
passphrase list, and double-check the SSID. Sorry it didn't work out.
1786 passphrases tested in 8.04 seconds: 222.04 passphrases/second
My problem was that CowPatty in anything other then my BT4 r2 vmware was not properly finding the handshake.
cowpatty -r Capture.cap -c -s SSID
End of pcap capture file, incomplete four-way handshake exchange. Try using a
different capture.
Hmm CowPatty is misbehaving on my regular machine, which is where I would want to pre-compute hashes and perform my cracking due to more memory and cores available on my primary system. I do not want to crack any passwords inside of a vmware unless its precomputed and I certainly do not want to try to compute hashes on a vmare either. So I decided to check another popular WPA cracking tool Pyrit against the password hash file.
Using Pyrit for cracking instead:
pyrit -r Capture.cap -i dictionary.txt attack_passthrough
This command was also failing on every single system for unknown reasons at the time. So I decided I was going to have to use Pyrit to Precompute hashes and then use those precomputed hashes inside of a vmware on cowpatty. Interestingly enough you can export pyrit hashtables in various formats to be used with airolib and cowpatty.
Pyrit Usage for Hashtables and cracking:
Pyrit is extremely useful for a few reasons, most importantly being that you can resume functionality such as creating hashtables if for some reason you have to stop an operation and unplug or shutdown your machine. You can simply quit pyrit like any other program, but pyrit will remember where it left off in its hashtable computing. No need to leave your machine in one place running for hours or days. Simply quit and resume at will.
Create a database of SSID’s for attack:
Pyrit –e essid create_essid
Add dictionary words to be hashed:
Pyrit –i dictionaryFile import_passwords
These 2 commands will create a dictionary of SSID and password values used in a standard attack or for precompution of hashtables. Another nice feature of pyrit is that you can keep running the dictionary command to add in as many dictionary files as you have available. Pyrit will remove duplicate entries and will also remove passwords that cannot be used in a WPA protected network such as passwords below 8 characters. This is fantastic, as you won’t waste processor cycles on passwords that are useless.
Create hashtables:
Pyrit batch
The previous command will create hashtables of everything in the database for the given SSID values in the database. At any point during this operation you can quit and resume simply by killing the operation and typing in the previous command again, pyrit will pick up where it left off. Once this is completed you can directly use Pyrit to attack a handshake or in my case pyrit was not recognizing the capture file so I had to export the database in cowpatty format with the following command.
Using pyrit to crack:
Pyrit –r capture.cap attack_db
Exporting different hashtable formats:
As I stated pyrit cracking didn’t work for me due to complications on the way pyrit parsed the capture file, the pyrit command would fail every time and not recognize the handshake. So I exported the hashtable database for use with cowpatty.
Cowpatty export:
Pyrit –e essid -o hashes.cow export_cowpatty
Note that you can also export to airolib format if you prefer using the aircrack suite of tools to do your pre-computed cracking just switch out the export_cowpatty command for the airolib command. Until I got pyrit working correctly I preferred to use cowpatty so I exported to my preferred format.
CowPatty File Size Issue:
Apparently when using 32 bit systems and hash file sizes over 2 gigs cowpatty will not work. So when I tried to directly attack the WPA PSK with the hashfile I was given an error “Could not stat hashfile. Check file path”.
cowpatty -r Capture.cap -d hashes.cow –s SSID
cowpatty 4.6 - WPA-PSK dictionary attack.
cowpatty: Could not stat hashfile. Check file path.
File Size WorkAround:
One way around this annoying issue was to pipe your hashfile into the STDIN value of CowPatty by outputting the hashfile with the unix “cat” command. You can do this by specifying the dash character as the input dictionary file in CowPatty. I found this to be very useful for a few reasons I will show next.
CowPatty with STDIN:
Cat hashes.cow | cowpatty –d - -r capture.cap -s SSID
Using the previous command you can bypass the filesize restriction and use precomputed hashfiles of larger sizes J But the STDIN can also be used for other cracking methods such as running custom bruteforcing of password files with JTR. By taking a dictionary and running it through the rules option of JTR additional characters such as numbers will be added to each word in your dictionary file. Although this may not be feasible do to the slow nature of password cracking without precomputed hashes, it is an option if dictionary files are not finding the password for you.
JTR STDOUT with CowPatty STDIN:
In the john directory type:
./john --wordlist=wordlist --stdout –rules |cowpatty –f - -r capture.cap -s SSID
Custom password list creation:
Another option would be to create a custom password list out of your current password list using JTR rules and then batch them with pyrit shown earlier in this blog post. You can create a custom password list by just using STDOUT to a new password file.
In the john directory type:
./john --wordlist=dictionary.txt --stdout --rules > newpasslist.txt
Then add these new passwords to your pyrit dictionary and re-batch the new passwords with the same commands show previously. This may help in situations where users choose passwords such as password4. Which isn’t a dictionary word but is certainly an easy password to guess.
Custom passwords via webpages:
You could also create yourself custom passwords lists via scraping the companies website or the system administrators personal webpage’s. Its not to hard to find out who the administrator is, make a few phone calls or check the companies webpage for listings of employees. Once a page is found you can scrape the page for password with a tool by the name of CEWL. Although I don’t condone the use of Ruby you may catch a weird disease or feel really dirty after using it yuuuk ruby, this is a useful tool for creating a custom password list.
./cewl.rb -d 1 -w passwordList.txt website.com
Cewl will create a custom password list named “passwordList.txt” which you can then run through john to add more passwords with numbers before batching the new passwords with pyrit. Pyrit will get rid of the useless passwords for you during password import.
The pyrit cracking issue:
I belive the cracking and parsing issue in pyrit was due to the version of pyrit that I was using. For me the only version of pyrit that functions correctly is the SVN version of pyrit currently available on the pyrit site. Any other version failed to work correctly for both parsing and for GPU cracking... See the previous post on this blog for getting your OSX machine to work with GPU and Pyrit. What this will do for you is allow you to efficiently crack passwords in pyrit with much quicker speeds even when passwords are not precomputed.
I hope some of these techniques are useful in your penetration testing whether its standard pentesting and password cracking or in my case WPA cracking.. These are mostly notes for myself in the future when I forget what the heck I did with filesizes and other issues random issues....
hellow sir
ReplyDeleteI wonder if it's possible that you post Pyrit with the use of a database. knowing Pyrit be used as a cluster with several machines involved in cracking. and how these machines will use the database
I have never personally tried to use a cracking cluster when doing my password cracking so I wouldn't be able to write an accurate post on doing that..
DeleteWith that said I would also note that it isn't really as necessary to cluster machines anymore. Instead grab yourself a few extra high end video cards to spread the work across and your numbers will skyrocket quickly via Open-CL or Cuda. This takes up less space and runs very fast.
Ok, need a hand, and i appreciate yallz help, awesome blog, so thanx, ok herez my troublez:
ReplyDeleteafter i get the rainbow tables made using:
genpmk -f /root/awesomefuggenlist.lst -s DeadbeatAP -d Deadbeat
that goes ok, then i try crakgenit using:
aircrack-ng -r wpacrack Deadbeathandshake-01.cap
i get the error not a pcap
what i'm confuzed on is i used aircrack to snag it, not sure what i'm doing wrong, i was getting errors trying to make a db using airolib, the sqlite error, grabbed headers, kernels, open ssl, gcc fix for the aircrack error and this:
sudo apt-get install libssl-dev
sudo apt-get install libsqlite-dev
sudo apt-get install openssl-dev
sudo apt-get install build-essential
sudo apt-get install gcc-4.4
open ssl wouldn't go so grabbed it from their site, build essential would go, the rest went ok, i'm on backbox, thsos edition,
i'm ok with getting the rainbow tables made
would like to do it using airolib,
need a hand with using the table now and aircrack or any form yall suggest to crack the handshake or at least try, thanx beaker
GenPMK is generally used with Cowpatty, did you try using cowpatty with the hashed tables that you created?
ReplyDeleteIf you want to use aircrack I would try creating the tables using airolib instead of genpmk or use pyrit to create the tables and then export the tables to whatever formate you like... Airolib of cowbpatty format if pyrit isnt your choice of crackers.
I generally stick with pyrit to handle everything from creating the database to hashing tables and cracking.
where do i get capture.cap file
ReplyDeleteFrom running airodump on your network and capturing a WPA handshake while you deauth a user off the network.
Delete