Answer the question
In order to leave comments, you need to log in
How is cloud computing used to brute wifi network?
I came across articles on foreign forums where cloud computing is used to brute the password of a wifi network. That's actually interesting, how does this happen? or I misunderstood something?
Answer the question
In order to leave comments, you need to log in
WPA/WPA2 (Wireless Protected Access). Brute force is the only way to find a key for a closed WPA / WPA2 network (and even then only if there is a dump of the so-called WPA Handshake, which is broadcast when the client connects to the access point). Brute force can drag on for days, months and years. To increase the efficiency of enumeration, specialized dictionaries were first used, then rainbow tables were generated, and later utilities appeared that used NVIDIA CUDA and ATI Stream technologies for hardware acceleration of the process due to the GPU. The tools used are aircrack-ng (dictionary brute force), cowpatty (using rainbow tables), pyrit (using a video card).
Probably, the articles meant renting capacities in the cloud for password brute force.
It would be easier if you provided links to specific articles.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question