Wifi Hacking : coWPAtty

Hacking WiFi through coWPAtty (Kali Linux)


Implementation of an offline dictionary attack against WPA/WPA2 networks using PSK-based authentication (e.g. WPA-Personal). Many enterprise networks deploy PSK-based authentication mechanisms for WPA/WPA2 since it is much easier than establishing the necessary RADIUS, supplicant and certificate authority architecture needed for WPA-Enterprise authentication. Cowpatty can implement an accelerated attack if a precomputed PMK file is available for the SSID that is being assessed


Above defination was technical….simply speaking…coWPAtty disconnects the currently connected user from wifi and for the user to reconnect it from wifi..as soon as user connects from wifi it steals the password….





cowpatty – WPA-PSK dictionary attack

genpmk – WPA-PSK precomputation attack

genpmk Usage Example

Use the provided dictionary file (-f /usr/share/wordlists/nmap.lst) to generate a hashfile, saving it to a file (-d cowpatty_dict) for the given ESSID (-s securenet):


NOTE: This is for educational purpose only we are not responsible for any type of inconvenience caused by reader.

Also Read :– Analyzing Packets in Wireshark

cowpatty Usage Example

Use the provided hashfile (-d cowpatty_dict), read the packet capture (-r Kismet-20140515-16-21-37-1.pcapdump), and crack the password for the given ESSID (-s 6F36E6):


Happy Pentesting/Hacking….. 🙂
Don’t forget to like us on facebook –> 

 Grey Hat Hackers

Share This:

Leave a Reply

Your email address will not be published. Required fields are marked *