Moscrack Cracking WPA Keys

P { margin-bottom: 0.08in; }
is a perl application designed to facilitate cracking WPA keys in
parallel on a group of computers. This is accomplished by use of
either Mosix clustering software, SSH or RSH access to a number of
With Moscrack’s new plugin framework, hash cracking has
become possible. SHA256/512, DES, MD5 and *Blowfish Unix password
hashes can all be processed with the Dehasher Moscrack plugin. 

P { margin-bottom: 0.08in; }


  • Basic
    API allows remote monitoring
  • Automatic
    and dynamic configuration of nodes
  • Live
    CD/USB enables boot and forget dynamic node configuration
  • Can
    be extended by use of plugins
  • Uses
    aircrack-ng (including 1.2 Beta) by default
  • CUDA/OpenCL
    support via Pyrit plugin
  • CUDA
    support via aircrack-ng-cuda (untested)
  • Does
    not require an agent/daemon on nodes
  • Can
    crack/compare SHA256/512, DES, MD5 and blowfish hashes via Dehasher
  • Checkpoint
    and resume
  • Easily
    supports a large number of nodes
  • Desgined
    to run for long periods of time
  • Doesn’t
    exit on errors/failures when possible
  • Supports
    mixed OS/protocol configurations
  • Supports
    SSH, RSH, Mosix for node connectivity
  • Effectively
    handles mixed fast and slow nodes or links
  • Architecture
  • Supports
    Mosix clustering software
  • Supports
    all popular operating systems as processing nodes
  • Node
    prioritization based on speed
  • Nodes
    can be added/removed/modified while Moscrack is running
  • Failed/bad
    node throttling
  • Hung
    node detection
  • Reprocessing
    of data on error
  • Automatic
    performance analysis and tuning
  • Intercepts
    INT and TERM signals for clean handling
  • Very
    verbose, doesn’t hide anything, logs agressively
  • Includes
    a “top” like status viewer
  • Includes
    CGI web status viewer
  • Includes
    an optional basic X11 GUI

P { margin-bottom: 0.08in; }


itself should work with any Un*x variant, but it is developed and
tested on Linux.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

The Complete OSINT Tutorial to Find Personal Information About Anyone

This article mainly focuses on how to discover a person's digital footprint and gather personal data by using open-source intelligence (OSINT). So, in its...

How to find the password of hacked email addresses using OSINT

Open-source intelligence or OSINT is a potent technique, and it can give a lot of valuable information, if implemented correctly with the right strategy...

How to Identify Company’s Hacked Email Addresses Using Maltego & HaveIbeenPawned

This article is part of the Maltego OSINT tutorial, where you will learn to identify the already hacked account, and it’s password using the...

5 Key Vulnerabilities in Global Payroll

The cyber threat against payroll is growing in sophistication and frequency, according to the latest FBI cybercrime report. Many of these attacks exploit fixable...