How to benchmark Pyrit

This is a short guide on How to benchmark Pyrit

Assuming you managed to setup CUDA and Pyrit correctly, move on to the code section.

If not, go back and follow this guide: How to Install Nvidia Kernel Module Cuda and Pyrit

Pyrit GTX460


Benchmarking Pyrit:

# pyrit benchmark
The Pyrit commandline-client (C) 2008 Lukas Lueg
This code is distributed under the GNU General Public License v3

The ESSID-blobspace seems to be empty; you should create an ESSID...
Available cores: 'Standard CPU', 'Nvidia CUDA'
Testing CPU-only core 'Standard CPU' (4 CPUs)...  1294.58 PMKs/s

Testing GPU core 'Nvidia CUDA' (Device 'GeForce 460 GTX')...  5409.43 PMKs/s

Feel free to post your outputs in the comment section.

Background on Pyrit

Pyrit allows to create massive databases, pre-computing part of the IEEE 802.11 WPA/WPA2-PSK authentication phase in a space-time-tradeoff. Exploiting the computational power of Many-Core- and other platforms through ATI-Stream, Nvidia CUDA, OpenCL and VIA Padlock, it is currently by far the most powerful attack against one of the world’s most used security-protocols.

WPA/WPA2-PSK is a subset of IEEE 802.11 WPA/WPA2 that skips the complex task of key distribution and client authentication by assigning every participating party the same pre shared key. This master key is derived from a password which the administrating user has to pre-configure e.g. on his laptop and the Access Point. When the laptop creates a connection to the Access Point, a new session key is derived from the master key to encrypt and authenticate following traffic. The “shortcut” of using a single master key instead of per-user keys eases deployment of WPA/WPA2-protected networks for home- and small-office-use at the cost of making the protocol vulnerable to brute-force-attacks against it’s key negotiation phase; it allows to ultimately reveal the password that protects the network. This vulnerability has to be considered exceptionally disastrous as the protocol allows much of the key derivation to be pre-computed, making simple brute-force-attacks even more alluring to the attacker. For more background see this article on the project’s blog.

The author does not encourage or support using Pyrit for the infringement of peoples’ communication-privacy. The exploration and realization of the technology discussed here motivate as a purpose of their own; this is documented by the open development, strictly sourcecode-based distribution and ‘copyleft’-licensing.

Pyrit is free software – free as in freedom. Everyone can inspect, copy or modify it and share derived work under the GNU General Public License v3+. It compiles and executes on a wide variety of platforms including FreeBSD, MacOS X and Linux as operation-system and x86-, alpha-, arm-, hppa-, mips-, powerpc-, s390 and sparc-processors.

All code can be found at

A more theoretical background of Pyrit can be found here.

Thanks for reading.

Check Also

How to fix You can’t access this shared folder because your organization’s security policies block unauthenticated guest access error on Windows 11

If you have the following error on Windows 11 “You can’t access this shared folder …

How to unhide menu bar in Virtualbox - blackMORE Ops - 2

How to unhide menu bar in Virtualbox

So I went in and hid the top menu bar and bottom status bar in Virtualbox. After they disappeared, now I cannot find out how to unhide those. Took me a little bit time to figure out, hence this post so that I don't forget it and someone else having the same to unhide menu bar in Virtualbox can find this.


  1. Without CAL++

    root@kali:~# pyrit benchmark
    Pyrit 0.4.0 (C) 2008-2011 Lukas Lueg
    This code is distributed under the GNU General Public License v3+
    Running benchmark (1202.3 PMKs/s)… |
    Computed 1202.26 PMKs/s total.
    #1: 'CPU-Core (SSE2)': 323.1 PMKs/s (RTT 3.0)
    #2: 'CPU-Core (SSE2)': 325.4 PMKs/s (RTT 3.1)
    #3: 'CPU-Core (SSE2)': 327.2 PMKs/s (RTT 3.0)
    #4: 'CPU-Core (SSE2)': 319.6 PMKs/s (RTT 3.0)

    After CAL++ it’s better … See comments here How to install CAL++ in Kali Linux?

  2. Running benchmark (206050.5 PMKs/s)… –

    Computed 206050.49 PMKs/s total.
    #1: ‘CPU-Core (SSE2/AES)’: 51512.2 PMKs/s (RTT 2.9)
    #2: ‘CPU-Core (SSE2/AES)’: 51512.1 PMKs/s (RTT 2.8)
    #3: ‘CPU-Core (SSE2/AES)’: 51512.2 PMKs/s (RTT 3.0)
    #4: ‘CPU-Core (SSE2/AES)’: 51512.0 PMKs/s (RTT 3.0)

Leave your solution or comment to help others.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from blackMORE Ops

Subscribe now to keep reading and get access to the full archive.

Continue reading

Privacy Policy on Cookies Usage

Some services used in this site uses cookies to tailor user experience or to show ads.