Aircrack-ng

Capturing WPA handshakes and cracking network passwords.

Tutorial Video

Requirements

Step 1: Installation

Step 2: Check available Wi-Fi cards. And disable any processes that may interfere with monitor mode.

The internal Wi-Fi card can interfere with the deauth process so we set it to down with this command.

This command will check any processes that my interfere with our Wi-Fi adapter in monitor mode.

This command then kills any of the processes listed from the command above.

Step 3: The next command will set the Wi-Fi adapter into monitor mode.

Step 4: Next we want to grab the hex value of our target network.

Our hotspot named TestNetwork seems to be operating on channel 6 with the shown mac address.

Step 5: Now we only want to listen to devices trying to connect to our target network so we run the following command.

Step 6: Now we can see the network and a device that is currently connected. We want to deauth this device from the network and capture the WPA handshake when it attempts to re-join the network.

The network hash is the first BSSID and the device hash is the second listed station.

Step 7: Once we have captured the wpa handshake we can turn off monitor mode on our adapter and attempt to crack the password using a list of popular used passwords.

Your capture file will be saved to your device. There may be multiple capture files so use the most recent one created.

Step 8: Congrats!!! πŸ₯³πŸ₯³πŸ₯³ you have just learned how to use Aircrack-ng to capture and crack a wpa handshake.

I am not liable for any misuse of this knowledge. This tutorial is for educational purposes only.

Last updated