![Kali Linux:An Ethical Hacker's Cookbook(Second Edition)](https://wfqqreader-1252317822.image.myqcloud.com/cover/772/36698772/b_36698772.jpg)
上QQ阅读APP看书,第一时间看更新
Cracking the PSK
- Adding a –P flag in the ike-scan command will show a response with the captured hash.
- To save the hash, we provide a filename along with the –P flag.
- Next, we can use psk-crack with the following command:
psk-crack –b 5 /path/to/pskkey
-b is brute force mode and length is 5.
- To use a dictionary-based attack, we use the following command with -d flag to input the dictionary file:
psk-crack –d /path/to/dictionary /path/to/pskkey
The following screenshot shows the output of the preceding command:
![](https://epubservercos.yuewen.com/E581D7/19470380608818806/epubprivate/OEBPS/Images/1eed991a-ed5a-4d21-bf6d-e56189164391.png?sign=1738838560-BdHwVeNJ10YEVHcBn99vuiyZe3ZpcagZ-0-9c195d6badc7903c973be880ece31109)