Source: cowpatty Section: net Priority: optional Maintainer: Debian Security Tools Uploaders: Samuel Henrique Build-Depends: debhelper-compat (= 13), libpcap-dev, libssl-dev Standards-Version: 4.5.0 Rules-Requires-Root: no Homepage: https://www.willhackforsushi.com/?page_id=50 Vcs-Browser: https://salsa.debian.org/pkg-security-team/cowpatty Vcs-Git: https://salsa.debian.org/pkg-security-team/cowpatty.git Package: cowpatty Architecture: any Depends: ${misc:Depends}, ${shlibs:Depends} Description: Brute-force WPA dictionary attack If you are auditing WPA-PSK or WPA2-PSK networks, you can use this tool to identify weak passphrases that were used to generate the PMK. Supply a libpcap capture file that includes the 4-way handshake, a dictionary file of passphrases to guess with, and the SSID for the network.