


To focus on that AP, we need the BSSID and it’s Channel. Once we have a target, we can focus on it. Once our adapter is in monitoring mode, the name of the To find out which one you are using, you can run the following commands to see. I’m using Wlan1 because it’s the interface for my Alfa adapter. Most built in wireless adapters will only receive so you may need to purchase one.įirst, we need to enable monitoring mode on our adapter. It’s important to note that you will need a wireless adapter that can send and receive traffic. If it does, you know the original word.Īircrack-ng comes pre-installed with Parrot OS and Kali however if you need to download it, follow these instructions: Once it gets to it will hash the value and see if the hash matches the one collected from the handshake. Aircrack-ng will run through the wordlist and hash each value. We will also need a wordlist such as rockyou.txt in order to crack the password. Once we have the hash, we can use Aircrack-ng. This is what we are trying to collect and crack. This is the hash which is present in the handshake. Let’s say our wireless password is This gets hashed and becomes 161ebd7d45089b3…. What it is actually doing is hashing words pulled from a wordlist and comparing the hash. There is some misconception that this tool breaks the hash to extract the password. Because of this, there is a chance it can be cracked.īelow we are using Aircrack-ng to crack the Wireless password. For instance, the hotspot at your local Café. You can change this though to make life easier. By default these routers are somewhat secure because they use a randomize password per router. You can tell this because you will require a key before your device can connect. WPA/WPA2 come as standard nowadays and even your broadband router should comply. This control is in place to stop unauthorized access to the network. Some are open, and some require you to enter a password before you can join.
