WiFi Security Tutorial-Capturing Handshake File in KALI 2.0 SANA HD

09.03.2016
This is the most important step for cracking wifi password with no vulnerabilities like WPS enabled,WEP secured(i.e., only WPA/WPA2). Handshake File : As we all know that to compare anything we need a right thing and the thing to be compared. In this case the right thing = correct wifi password(in encrypted format) the thing to be compared = key that one of the client used to connect to that AP(access point or wifi router) Handshake file is that right thing(correct encrypted password) which we have to capture and then crack it using dictionaries. commands used: airodump-ng -c (channel no.) --bssid (bssid of target ap) wlan0 aireplay-ng -0 (no. of deauth packets) -a (bssid of target ap) -c (one of its client or station bssid) wlan0 note: * -c in aireplay is optional * Atleast one user should be connected(or else from whom the handshake is done :p). deauth = de + authentication i.e, the clients will be disconnected so that they can reconnect(thats usually occurs whenever we r in a saved wifi zone), this is where we will get handshake file. Advice : For me bruteforce is the least option because sometimes password is very simple like 1 to 10 nos. or something like that but like 1/100000. Q. So why am i posting this? A. bcoz most of the time you will get wpa/wpa2 only.

Похожие видео

Показать еще