itsnotme wrote:The original topic was WPA cracking? My god man, are you insane to bring it back on topic?!
OK, maybe not the original topic, but close to. Genpmk could probably be ported to OS X anyway. I'm having a look at it now.
Edit: Alright, it's compiled. Not entirely sure about how well it will work.
Edit again:
x:~/cowpatty gm$ ./cowpatty -r eap-test.dump -f dict -s somethingclever
cowpatty 4.0 - WPA-PSK dictionary attack. <jwright@hasborg.com>
Collected all necessary data to mount crack against WPA/PSK passphrase.
Starting dictionary attack. Please be patient.
The PSK is "family movie night".
6 passphrases tested in 0.52 seconds: 11.59 passphrases/second
(yes, I cheated and moved the correct passphrase up to near the top of the list, I couldn't be bothered waiting for it to get through 4000 of them. It still found it correctly though, and that's what counts).
Well, it seems to work. I'll give you my modified sources, you can cd in and run make (you've got an Intel mac, I've got a PowerPC Mac, and as such, not the full complement of Intel system libraries to link against...).
http://x9.ath.cx/cowpatty-osx.tar.gzI added two missing header files (endian.h and byteswap.h), and removed the reference to crypt.h (in OS X, the functions from crypt.h are in unistd.h, and there is no crypt.h). Easy enough... it could probably be #ifdef'd into the sources for a better approach, and changed at compile time depending on platform.