We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

PACKET HACKING VILLAGE - WPA-SEC: The largest online WPA handshake database

Formal Metadata

Title
PACKET HACKING VILLAGE - WPA-SEC: The largest online WPA handshake database
Title of Series
Number of Parts
322
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Started as pet project in 2011, wpa-sec collects WPA handshake captures from all over the world. Contributors use client script to download handshakes and special crafted dictionaries to initiate attack against PSKs. With more than 115 GB captures from 240 000 submissions, collected samples represent invaluable source for wireless security research. This includes: Many improvements for emerging wireless security tools like hcxtools suite. Identified default PSK key generation algorithms, used by various ISPs. Those, along with fixes for current implementations get in RouterKeygen project. Many more to come, based on current research activities Performance optimizations for WPA crackers Identified some linux kernel driver bugs During the talk I will explain how wpa-sec works, provide statistics and a lot internals on optimization and how to use the database as OSINT source during pentests and red team actions.