Binary package “cowpatty” in ubuntu noble
Brute-force WPA dictionary attack
If you are auditing WPA-PSK or WPA2-PSK networks, you can use
this tool to identify weak passphrases that were used to generate the
PMK. Supply a libpcap capture file that includes the 4-way handshake, a
dictionary file of passphrases to guess with, and the SSID for the
network.
Source package
Published versions
- cowpatty 4.8-3build1 in amd64 (Release)
- cowpatty 4.8-3build1 in amd64 (Updates)
- cowpatty 4.8-3build3 in amd64 (Proposed)
- cowpatty 4.8-3build3 in amd64 (Release)
- cowpatty 4.8-3build1 in arm64 (Release)
- cowpatty 4.8-3build1 in arm64 (Updates)
- cowpatty 4.8-3build3 in arm64 (Proposed)
- cowpatty 4.8-3build3 in arm64 (Release)
- cowpatty 4.8-3build1 in armhf (Release)
- cowpatty 4.8-3build1 in armhf (Updates)
- cowpatty 4.8-3build3 in armhf (Proposed)
- cowpatty 4.8-3build3 in armhf (Release)
- cowpatty 4.8-3build1 in ppc64el (Release)
- cowpatty 4.8-3build1 in ppc64el (Updates)
- cowpatty 4.8-3build3 in ppc64el (Proposed)
- cowpatty 4.8-3build3 in ppc64el (Release)
- cowpatty 4.8-3build1 in riscv64 (Release)
- cowpatty 4.8-3build1 in riscv64 (Updates)
- cowpatty 4.8-3build3 in riscv64 (Proposed)
- cowpatty 4.8-3build3 in riscv64 (Release)
- cowpatty 4.8-3build1 in s390x (Release)
- cowpatty 4.8-3build1 in s390x (Updates)
- cowpatty 4.8-3build3 in s390x (Proposed)
- cowpatty 4.8-3build3 in s390x (Release)