pyrit
WPA/WPA2 cracking tool using computational power. More information: https://github.com/JPaulMora/Pyrit.
-
Display system cracking speed:
pyrit benchmark
-
List available cores:
pyrit list_cores
-
Set [e]SSID:
pyrit -e "{{ESSID}}" create_essid
-
[r]ead and analyze a specific packet capture file:
pyrit -r {{path/to/file.cap|path/to/file.pcap}} analyze
-
Read and [i]mport passwords to the current database:
pyrit -i {{path/to/file}} {{import_unique_passwords|unique_passwords|import_passwords}}
-
Exp[o]rt passwords from database to a specific file:
pyrit -o {{path/to/file}} export_passwords
-
Translate passwords with Pired Master Keys:
pyrit batch
-
[r]ead the capture file and crack the password:
pyrit -r {{path/to/file}} attack_db
License and Disclaimer
The content on this page is copyright © 2014—present the tldr-pages team and contributors.This page is used with permission under Creative Commons Attribution 4.0 International License.
While we do attempt to make sure content is accurate, there isn't a warranty of any kind.