Get flash to fully experience Pearltrees
Pyrit allows to create massive databases, pre-computing part of the IEEE 802.11 WPA/WPA2-PSK authentication phase in a space-time-tradeoff. Exploiting the computational power of Many-Core- and other platforms through ATI-Stream , Nvidia CUDA and OpenCL , it is currently by far the most powerful attack against one of the world's most used security-protocols. WPA/WPA2-PSK is a subset of IEEE 802.11 WPA/WPA2 that skips the complex task of key distribution and client authentication by assigning every participating party the same pre shared key . This master key is derived from a password which the administrating user has to pre-configure e.g. on his laptop and the Access Point. When the laptop creates a connection to the Access Point, a new session key is derived from the master key to encrypt and authenticate following traffic.
You are here: Products > Portable Penetrator With Portable Penetrator you can recover Wifi Passwords for WEP, WPA, WPA2, and WPS. This way you can secure your wifi network and make sure attackers can not break in. You also get Vulnerability Scanning and launch of real exploits