{"id":67,"date":"2009-04-15T20:59:24","date_gmt":"2009-04-16T00:59:24","guid":{"rendered":"http:\/\/www.willhackforsushi.com\/blog\/?page_id=67"},"modified":"2009-04-15T21:04:21","modified_gmt":"2009-04-16T01:04:21","slug":"eapmd5pass","status":"publish","type":"page","link":"https:\/\/www.willhackforsushi.com\/?page_id=67","title":{"rendered":"eapmd5pass"},"content":{"rendered":"<p>An implementation of an offline dictionary attack against the EAP-MD5 protocol.  This utility can be used to audit passwords used for EAP-MD5 networks from wireless packet captures, or by manually specifying the challenge, response and associated authentication information.<\/p>\n<hr \/>\n<h2>News<\/h2>\n<p>Feb 18 2008<\/p>\n<p>Demonstrated eapmd5pass at Shmoocon 4 in the session &#8220;PEAP: Pwned Extensible Authentication Protocol&#8221;.  Available in the download section below, hit me up with any questions.<\/p>\n<hr \/>\n<h2>Screenshots<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.willhackforsushi.com\/blog\/wp-content\/uploads\/2009\/04\/eapmd5pass1.png\" alt=\"eapmd5pass1\" title=\"eapmd5pass1\" width=\"724\" height=\"524\" class=\"aligncenter size-full wp-image-68\" srcset=\"https:\/\/www.willhackforsushi.com\/wp-content\/uploads\/2009\/04\/eapmd5pass1.png 724w, https:\/\/www.willhackforsushi.com\/wp-content\/uploads\/2009\/04\/eapmd5pass1-300x217.png 300w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.willhackforsushi.com\/blog\/wp-content\/uploads\/2009\/04\/eapmd5pass2.png\" alt=\"eapmd5pass2\" title=\"eapmd5pass2\" width=\"727\" height=\"163\" class=\"aligncenter size-full wp-image-69\" srcset=\"https:\/\/www.willhackforsushi.com\/wp-content\/uploads\/2009\/04\/eapmd5pass2.png 727w, https:\/\/www.willhackforsushi.com\/wp-content\/uploads\/2009\/04\/eapmd5pass2-300x67.png 300w\" sizes=\"auto, (max-width: 727px) 100vw, 727px\" \/><\/p>\n<hr \/>\n<h2>Download<\/h2>\n<p><strong>eapmd5pass 1.4<\/strong><br \/>\n <a href=\"http:\/\/www.willhackforsushi.com\/code\/eapmd5pass\/1.4\/eapmd5pass-1.4.tgz\">Linux source<\/a> (27K, MD5:b7e1d44395c068140d9243f0f4408e04)<br \/>\n<a href=\"http:\/\/www.willhackforsushi.com\/code\/eapmd5pass\/1.4\/README\">README<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>An implementation of an offline dictionary attack against the EAP-MD5 protocol. This utility can be used to audit passwords used for EAP-MD5 networks from wireless packet captures, or by manually specifying the challenge, response and associated authentication information. News Feb &hellip; <a href=\"https:\/\/www.willhackforsushi.com\/?page_id=67\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":17,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-67","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=\/wp\/v2\/pages\/67","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=67"}],"version-history":[{"count":5,"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=\/wp\/v2\/pages\/67\/revisions"}],"predecessor-version":[{"id":77,"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=\/wp\/v2\/pages\/67\/revisions\/77"}],"up":[{"embeddable":true,"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=\/wp\/v2\/pages\/17"}],"wp:attachment":[{"href":"https:\/\/www.willhackforsushi.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=67"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}