wpa-sec.stanev.org Open in urlscan Pro
2606:4700:3037::6815:2c49  Public Scan

Submitted URL: http://wpa-sec.stanev.org/
Effective URL: https://wpa-sec.stanev.org/
Submission: On January 23 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET

<form action="" method="get">Search <input class="searchinput" type="text" id="search" name="search" value=""></form>

POST

<form action="" method="post">Key <input class="searchinput" type="text" id="key" name="key" value=""></form>

Text Content

Distributed WPA PSK auditor
 * Search
 * Key
 * Home
 * Get key
 * Submit
 * Nets
 * Dicts
 * Stats


INTRODUCTION

This is a community effort to study and improve security of WPA protected WiFi
networks. You can contribute to WPA security research - the more handshakes you
upload, the more stats, and the more we'll understand how feasible WPA cracking
is in practice.
Source code is available at GitHub.



USAGE

First step is to issue your own key. This is nessesary if you want to see the
results from your uploaded handshakes. To obtain the WPA handshake, use
hcxdumptool. hcxtools is new generation sophisticated set of tools for WPA audit
and penetration tests. You can then upload valid pcap format captures via the
web interface.
Note: please do not use any additional tools to strip or modify the capture
files, since they can mangle handshakes and lead to uncrackable results.





DISTRIBUTED WPA CRACKING

There is no dedicated resource on this machine for handshake cracking. All the
work is done from volunteers like you, who contribute CPU/GPU to the cracking
process by running help_crack.py [CHANGELOG], a script that will automatically
fetch uncracked handshake, download wordlist, try to crack, and upload the
results to this site. Prerequisite: you must have python and hashcat or John the
Ripper "bleeding-jumbo" branch installed.
Put help_crack.py in the same directory as cracker binary and run it from there.





CRACKING UNDER WINDOWS

Install Python from here. Put cracker executables and help_crack.py in same
directory and run help_crack.py from cmd shell.



--------------------------------------------------------------------------------

Contact: alex at stanev dot org Twitter:@RealEnderSec