Moscrack Cracking WPA Keys

P { margin-bottom: 0.08in; }

is a perl application designed to facilitate cracking WPA keys in
parallel on a group of computers. This is accomplished by use of
either Mosix clustering software, SSH or RSH access to a number of
With Moscrack’s new plugin framework, hash cracking has
become possible. SHA256/512, DES, MD5 and *Blowfish Unix password
hashes can all be processed with the Dehasher Moscrack plugin. 

P { margin-bottom: 0.08in; }


  • Basic
    API allows remote monitoring
  • Automatic
    and dynamic configuration of nodes
  • Live
    CD/USB enables boot and forget dynamic node configuration
  • Can
    be extended by use of plugins
  • Uses
    aircrack-ng (including 1.2 Beta) by default
  • CUDA/OpenCL
    support via Pyrit plugin
  • CUDA
    support via aircrack-ng-cuda (untested)
  • Does
    not require an agent/daemon on nodes
  • Can
    crack/compare SHA256/512, DES, MD5 and blowfish hashes via Dehasher
  • Checkpoint
    and resume
  • Easily
    supports a large number of nodes
  • Desgined
    to run for long periods of time
  • Doesn’t
    exit on errors/failures when possible
  • Supports
    mixed OS/protocol configurations
  • Supports
    SSH, RSH, Mosix for node connectivity
  • Effectively
    handles mixed fast and slow nodes or links
  • Architecture
  • Supports
    Mosix clustering software
  • Supports
    all popular operating systems as processing nodes
  • Node
    prioritization based on speed
  • Nodes
    can be added/removed/modified while Moscrack is running
  • Failed/bad
    node throttling
  • Hung
    node detection
  • Reprocessing
    of data on error
  • Automatic
    performance analysis and tuning
  • Intercepts
    INT and TERM signals for clean handling
  • Very
    verbose, doesn’t hide anything, logs agressively
  • Includes
    a “top” like status viewer
  • Includes
    CGI web status viewer
  • Includes
    an optional basic X11 GUI

P { margin-bottom: 0.08in; }


itself should work with any Un*x variant, but it is developed and
tested on Linux.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...