WPA & WPA2 PSK
Cracking WPA/WPA2 with Handshake Capture
In this tutorial, we'll demonstrate how to crack WPA/WPA2 encrypted networks by capturing the 4-way handshake and then using tools like aircrack-ng and hashcat to crack the password.
Prerequisites
Ensure you have the following:
A wireless card that supports monitor mode.
The necessary tools:
airmon-ng,airodump-ng,aireplay-ng,aircrack-ng,hashcat.A wordlist (e.g.,
/usr/share/wordlists/rockyou.txt).
Step-by-Step Process
1. Start Interface in Monitor Mode and Kill Unwanted Services
Start by disabling any interfering processes and putting your wireless interface into monitor mode:
airmon-ng check kill && airmon-ng start wlan0airmon-ng check kill: Stops interfering processes.airmon-ng start wlan0: Puts the wireless interfacewlan0into monitor mode (wlan0mon).
2. Scan for Networks
Next, scan for nearby wireless networks to identify the one you want to target:
3. Scan on Specific AP and Channel with Output File
Once you've identified the target AP, run airodump-ng on the specific network to capture data:
<BSSID>: The MAC address of the target AP.<Channel>: The channel number on which the AP is operating.<WPA1?>: The name of the file where you want to save the captured data.
4. De-Authenticate Clients to Capture Handshake
In order to capture the 4-way handshake, de-authenticate a connected client using aireplay-ng:
-a <BSSID>: The BSSID of the target AP.-c <Client Mac>: The MAC address of a client connected to the AP.-0 0: Sends deauthentication packets indefinitely until the handshake is captured.
5. Crack the WPA/WPA2 Key Using Aircrack-ng
Once the handshake is captured, use aircrack-ng to crack the password:
<output_file>.cap: The capture file containing the handshake.<ESSID>: The name (SSID) of the target network.
You can also use a wordlist for a more efficient brute-force attack:
6. Crack the WPA/WPA2 Key Using Hashcat
Alternatively, you can use hashcat for cracking the WPA/WPA2 key. First, convert the .cap file to a hashcat-compatible format:
<output_file>.cap: The original capture file.<output_file>.hc22000: The converted hashcat file.
Next, run hashcat to crack the WPA/WPA2 key:
7. Conclusion
Once the password is cracked, you should have access to the network. Connecting to the Network:
<filename>.conf: The WPA configuration file containing network details.
Request IP from DHCP Server:
By following these steps, you'll be able to crack the WPA/WPA2 password and gain access to the network.
Last updated