I’ll be using the aircrack-ng suite of tools to capture the 4-way handshake\wireless password and then the power of Hashcat to crack the wireless password using the graphics card built into my laptop to speed up the whole process. We can then capture the password at this time and attempt to crack it. When a client authenticates to an access point the client and the access point go through a 4 step process to authenticate the user to the access point. The weakness in WPA/WPA2 wireless passwords is that the encrypted password is shared in what is known as a 4-way handshake. This I hope will be part of a new series of tutorials dedicated to hacking wireless networks. In this tutorial, I will show you how to capture and then crack WPA/WPA2 Wireless passwords.
0 Comments
Leave a Reply. |