Do WPA Dictionary Attacks Use Salts?

Feb 23, 2016 09:59 PM

When I first started using linux about half a year ago all I wanted to do was crack wifi passwords until I realised that there were much better things to do. However, recently I've been reading about rainbow tables and have seen the way they work etc and how they are much faster. I wanted to generate a table from a dictionary I had made a long time ago, and read that when using genpmk you need the essid of the router as a salt for the hashes. That made me wonder, when doing an ordinary dictionary attack on a handshake with aircrack, are salts used somehow? Same with brute force attacks. I have never seen any options to use a salt, and have never needed to with wifi before. Is the essid already in the cap file? Or does it simply not use one?

Related Articles

637587411395252764.jpg

How to Perform Advanced Man-in-the-Middle Attacks with Xerosploit

635211718118959676.jpg

How to Get Unlimited Free Trials Using a "Real" Fake Credit Card Number

Comments

No Comments Exist

Be the first, drop a comment!