Online WPA cracker with stats - besside-ng companion
Upload your WPA handshake here and your network will be
cracked for you automatically.
Contribute to WPA security research - the more handshakes you upload, the more
stats, and the more we'll understand how feasible WPA cracking is in practice
(currently 5% are crackable based on 50029 networks).
To obtain the WPA handshake, use besside-ng (from
aircrack-ng's SVN), a
tool that will automatically own all the WPA networks it finds. If you have
Internet connectivity while running besside-ng, use the -s wpa.darkircop.org
option to upload wpa.cap automatically.
WPA cracking in practice (live stats)
Based on 50029 networks and a
- What's the success rate when cracking WPA? 5% (2669/50029).
WPA cracking works by trying words from a dictionary until the password
is found. So the question is equivalent to "how many people use dictionary
words - like hello, world - as their WPA password?"
- Is a large dictionary necessary? You'll crack
52% more networks from the crackable ones.
A large dictionary has more chances of containing the network's password. But,
it may be that people either choose very simple passwords (so a small
dictionary will suffice) or a very complicated password (practically
uncrackable) giving large dictionaries diminishing returns.
- Do rainbow tables help? 2% of the crackable networks will be cracked faster.
speed up WPA cracking, but only when cracking networks who's name is present in
a predefined list of 1000 SSIDs. And, the passphrase still needs to be in the
Real-time WPA cracking results
Contribute your CPU to the cracking process by running dcrack.py, a script that will automatically
fetch uncracked networks, try to crack them, and upload the results to