CoWPAtty

WPA-PSK dictionary attack tool.

Visit Website →

Overview

CoWPAtty is one of the original tools designed for offline dictionary attacks against WPA/WPA2 networks. It operates on a captured four-way handshake and attempts to crack the passphrase using a provided wordlist. It is also known for its ability to use pre-computed hash files (rainbow tables) for a specific SSID, which can accelerate the cracking process dramatically if a table for that network name already exists.

✨ Key Features

  • Offline dictionary attack against WPA/WPA2-PSK
  • Uses a wordlist to test potential passphrases
  • Can generate and use pre-computed hash files based on SSID
  • Command-line interface

🎯 Key Differentiators

  • Focus on pre-computed hash files for specific SSIDs
  • Simplicity and focus on a single attack type
  • Historical significance as an early WPA cracker

Unique Value: Provides a straightforward, CPU-based method for WPA/WPA2 dictionary attacks, with a unique feature of using pre-computed hashes for common SSIDs.

🎯 Use Cases (2)

Cracking WPA/WPA2 passwords from a captured handshake Educational tool for understanding the WPA handshake and cracking process

✅ Best For

  • Successfully cracking a WPA2 password using a targeted wordlist.

💡 Check With Vendor

Verify these considerations match your specific requirements:

  • High-speed, GPU-accelerated cracking
  • Live network attacks
  • Attacking WEP or WPS

🏆 Alternatives

Aircrack-ng Hashcat Pyrit

Significantly slower than modern GPU-based tools like Hashcat or Pyrit. Its main advantage now is its simplicity and historical role in wireless security.

💻 Platforms

Desktop

✅ Offline Mode Available

🔌 Integrations

Aircrack-ng (for handshake capture)

💰 Pricing

Contact for pricing
Free Tier Available

Free tier: Full functionality, open-source.

Visit CoWPAtty Website →