Aircrack-ng
Capturing WPA handshakes and cracking network passwords.
Last updated
Capturing WPA handshakes and cracking network passwords.
Last updated
Wifi adapter that supports monitor mode.
Linux machine or virtual machine.
Aircrack-ng.
List of common passwords. https://github.com/danielmiessler/SecLists/blob/master/Passwords/Common-Credentials/10k-most-common.txt
Step 1: Installation
Step 2: Check available Wi-Fi cards. And disable any processes that may interfere with monitor mode.
The internal Wi-Fi card can interfere with the deauth process so we set it to down with this command.
This command will check any processes that my interfere with our Wi-Fi adapter in monitor mode.
This command then kills any of the processes listed from the command above.
Step 3: The next command will set the Wi-Fi adapter into monitor mode.
Step 4: Next we want to grab the hex value of our target network.
Our hotspot named TestNetwork seems to be operating on channel 6 with the shown mac address.
Step 5: Now we only want to listen to devices trying to connect to our target network so we run the following command.
Step 6: Now we can see the network and a device that is currently connected. We want to deauth this device from the network and capture the WPA handshake when it attempts to re-join the network.
The network hash is the first BSSID and the device hash is the second listed station.
Step 7: Once we have captured the wpa handshake we can turn off monitor mode on our adapter and attempt to crack the password using a list of popular used passwords.
Your capture file will be saved to your device. There may be multiple capture files so use the most recent one created.
Step 8: Congrats!!! 🥳🥳🥳 you have just learned how to use Aircrack-ng to capture and crack a wpa handshake.
I am not liable for any misuse of this knowledge. This tutorial is for educational purposes only.