Cracking the Key Quicker using a Rainbow Table

Lecture Transcript - Cracking the Key Quicker using a Rainbow Table

We saw in the previous video how we can use aircraft engine to crack WPA encrypted passwords using a word list. In the previous video, aircraft engine went through our word list. It combined each password in the word list with the easiest idea to create the PMK using the PB K2 algorithm and then compared the pancake to the

So our crack energy was creating the pancakes on the fly. The process of combining the password. A.S. ID to create Apmc takes a good bit of time, so it takes the most time of the cracking process. Therefore, in many scenarios, while we're waiting to capture the handshake, in many scenarios we'll have access points that doesn't have any

Because, as I said, converting the password to uppercase takes the most time. So while we're waiting, we can change each password in the list and create a new PMK list from our word list. And then once we capture the handshake, we can use our ready PMCs.

So it's going to be arrow live and you. We're going to create a new database. So let's call a test. DB. And we're going to import. Passwords. And we're going to put the name of our word list, which is called a WPA word list.

And as you can see, a new database called Test DB has been created. And the passwords have been imported into it. So the next command we're going to do is we're going to import our SS I.D. to the database.

I'm going to echo it to a file and I'm going to call the file. Tests. Yes, I'd. So that's basically. So I'm going to read it now cut test. Yes, this idea that's just making sure that the name is there.

Now I'm going to import this file into my database. So we're going to use the same command that we used before. The only difference is we're going to say we're importing yes, I do this time. And the name of the file that contains the society's test ECD.

USAID is just a text file that contains the name of my target access point. Going to hit enter and that has been imported successfully. Now, this is the step that takes the most time. We're going to convert each password in the list and we're going to combine it with the U.S. ID.

Which is just convert each password, combine it with the society, and create a pack from each password in the list. Okay. So as you can see now the it computed all the pbmcs. So that's the number of PMCs us the number of passports that I have in my original list.

So we can do this while we're waiting to capture the handshake. Once we have the handshake, then we can crack it straightaway. Using the PMCs, the already done PMCs, which will be much quicker. Let's see how we do that.

DB And then we're going to specify the handshake file going to enter. And as you can see, we cracked the password much, much quicker. We cracked it in less than a second. So in the previous video, it took 2 minutes and 16 seconds.

We have our PMCs ready so that once we capture the handshake, we can crack it straightaway.



Complete and Continue  

Become a Member and Get Unlimited Access to 310+ Top Cyber Security Courses.