# Using aircrack-ng to get WPA2 passwords

##### 2016-11-01 11:00:00 +0000, 1 year and 11 months ago

First off do:

To get your wireless card, it’s typically wlan0.

Then,

Enable moniter mode on your wireless card, typically creates the mon0 instance.

To list local networks:

Then copy BSSID of target network + channel.

Now, replace targetnetworkbssid with the actual target network BSSID which you copied previously.

Leave it running.

Open a new terminal and do,

But replace targetbssid with the network BSSID from airodump-ng, replace targetstation with station MAC address from airodump, this kicks whoever is connected on the network at that station off it, once they reconnect we can do a handshake and steal the password.

You should see WPA handshake … on airodump-ng terminal if they’ve reconnected.

Now it’s time to crack the password with:

Replace targetbssid with the actual BSSID, dictionary.txt is the dictionary file to use, and *.cap are the files that are going to be cracked.

If all goes well you should get the password, else try a different dictionary.

Return?