1 00:00:01,180 --> 00:00:10,600 Cow patty is a versatile tool that can recover the pressure keys using both dictionary and rainbow table 2 00:00:10,600 --> 00:00:11,140 attacked. 3 00:00:12,140 --> 00:00:19,370 Although it's not being actively developed, it is quite useful still, especially when using its rainbow 4 00:00:19,370 --> 00:00:20,370 table attack method. 5 00:00:21,560 --> 00:00:25,370 So for this reason alone, it's worth adding to your arsenal of tools. 6 00:00:26,850 --> 00:00:34,560 So since a cow patty does not include a sniffer component, it still requires a handshake to be captured 7 00:00:34,560 --> 00:00:38,010 with an external tool such as arrow dumping. 8 00:00:39,150 --> 00:00:42,780 So I'll just use the handshake file that we previously captured. 9 00:00:44,320 --> 00:00:48,670 So go to Calli and first we'll type Cowpat and you see the parameters. 10 00:00:50,060 --> 00:00:53,810 And we'll give it a dictionary file with the F parameter. 11 00:00:56,180 --> 00:00:58,910 Now I'll use the rainbow table attack of kabaddi. 12 00:00:59,910 --> 00:01:07,380 So the main purpose behind using cow patty is to make use of pre computed hashes similar to aero lib 13 00:01:07,380 --> 00:01:15,570 and to crack passwords, so by using these pre computed hashes, frequently called rainbow tables. 14 00:01:17,060 --> 00:01:24,230 This will significantly reduce the time required to crack passwords, as are all of the computation 15 00:01:24,230 --> 00:01:25,550 is done ahead of time. 16 00:01:26,610 --> 00:01:35,190 So that means we first need to generate the hashes for our SS idea, along with a dictionary file containing 17 00:01:35,190 --> 00:01:35,910 passwords. 18 00:01:40,580 --> 00:01:48,350 Now, cow patty included Tooele, Jen, PMK, and this can be used to generate the required rainbow 19 00:01:48,350 --> 00:01:48,890 tables. 20 00:01:50,090 --> 00:01:55,370 It also has a following syntax, Jen, PMK f. 21 00:01:56,320 --> 00:01:58,570 The fall path of the dictionary file. 22 00:01:59,890 --> 00:02:04,690 The final to save the computed hashes and the network yes ID. 23 00:02:07,300 --> 00:02:09,880 Far out now, it's creating the harsh fire. 24 00:02:16,950 --> 00:02:22,350 It's OK, so it's time to run Cowpat using the captured file and generated hashes. 25 00:02:23,550 --> 00:02:30,240 And I'll also add the two parameter, it's a non strict mode because Cowpat, he has an issue with Aradigm 26 00:02:30,240 --> 00:02:30,810 captures. 27 00:02:32,590 --> 00:02:35,980 So finally, add the network inside and run it. 28 00:02:37,800 --> 00:02:41,990 Maybe this parameter is no longer used, so still eat it and run it again. 29 00:02:45,210 --> 00:02:48,870 Oh, he found the key very quickly at time.