Using aircrack-ng to get WPA2 passwords
Nov 01, 16 - 11:00am, 1 year and 7 months ago
First off do:
To get your wireless card, it’s typically wlan0.
Enable moniter mode on your wireless card, typically creates the
To list local networks:
Then copy BSSID of target network + channel.
Now, replace targetnetworkbssid with the actual target network BSSID which you copied previously.
Leave it running.
Open a new terminal and do,
But replace targetbssid with the network BSSID from airodump-ng, replace targetstation with station MAC address from airodump, this kicks whoever is connected on the network at that station off it, once they reconnect we can do a handshake and steal the password.
You should see WPA handshake … on airodump-ng terminal if they’ve reconnected.
Now it’s time to crack the password with:
Replace targetbssid with the actual BSSID, dictionary.txt is the dictionary file to use, and *.cap are the files that are going to be cracked.
If all goes well you should get the password, else try a different dictionary.