
For more information, check out Hardware acceleration. If multiple cards are installed, all of them will be shown click to see more information, and check out the Device info box press Drivers info to get additional information about the video drivers installed.

The Available devices box shows information about compatible video cards or hardware accelerators that can be utilized by EWSA to accelerate the attacks. The Summary box shows more information about the OS, machine name, user name, Administrator privileges, and CPU(s). Press Auto detect to set this option automatically according to the number of processors installed. Processor utilization: sets the number of CPUs or CPU cores to run the attack. Please note that neither PSPR nor EWSA cannot extract hashes in a situation when wireless configuration is driven by a third-party (vendor-supplied) utility instead of WZC.įinally, you can add the password hash manually. EWSA can also dump password hashes from the local Registry (use the Dump Windows WPAPSK hashes menu). When used on a computer with WZC (Wireless Zero Configuration), that program can save the WPA-PSK password hash into a text file (press Export in Misc Features | Wireless network).

#Http sniffer windows 7 wireless install#
If you use AirPCap, you need to install its own drivers with third-party adapters, you need to install a custom NDIS drivers bundled with EWSA.ĮWSA also supports the following input data:įor more details on using the built-in sniffer and importing data from tcpdump and Tamos CommView logs, see Capturing network packets.Īlternatively, you can import the data from a PSPR log, where PSPR stands for Proactive System Password Recovery. Working with EWSA ELCOMSOFT.COM » Elcomsoft Wireless Security AuditorĮWSA (Professional edition only) includes an integrated network sniffer that supports AipPCap adapters, as well as most modern 'generic' consumer models.
