wpa-sec currently is upgrading. Submissions are accepted, but no dustributed crackers are allowed to run. All jobs will continue at later time. No timeline when will this happen, sorry.
IntroductionThis is a community effort to study and improve security of WPA protected WiFi networks. You can contribute to WPA security research - the more handshakes you upload, the more stats, and the more we'll understand how feasible WPA cracking is in practice.
This site is based on sorbo's work on wpa.darkircop.org. Source code is freely available at GitHub.
UsageFirst step is to issue your own key. This is nessesary if you want to see the results from your uploaded handshakes. To obtain the WPA handshake, use besside-ng (from aircrack-ng's SVN), a tool that will automatically collect and store handshakes for all the WPA networks it finds. If you have Internet connectivity while running besside-ng, use the -s wpa-sec.stanev.org option to upload wpa.cap automatically. However, this will not associate your key with the handshakes. You can upload valid libpcap format captures via the web interface.
Distributed WPA crackingThere is no dedicated resource on this machine for handshake cracking. All the work is done from volunteers like you, who contribute CPU/GPU to the cracking process by running help_crack.py [CHANGELOG], a script that will automatically fetch uncracked network, download wordlist, try to crack, and upload the results to this site. Prerequisite: you must have python(tested with 2.7), Hashcat, oclHashcat, pyrit or aircrack-ng installed.
Cracking under WindowsInstall Python 2.7.6 or newer from here and Python for Windows extensions from here. You can download precompiled binary of aircrack-ng for windows here, or use Hashcat for Windows. If you have CUDA/OpenCL GPU, download oclHashcat.
Put executables and help_crack.py in same directory and run help_crack.py from cmd shell.