![]() The location of where this two files are and there names will be up to you. Where the file name is the handshake file you captured and the dictionary location is the path to your dictionary. ![]() We will be using aircrack to do the cracking and the command to do this is:Īircrack-ng (file name) -w (dictionary location) (Be sure to use the number 0 in darkc0de.lst) The dictionary that we will use is built into backtrack under the /pentest/passwords/wordlists and is called darkc0de.lst. The default storage for a WPA handshake is under /root and will be there under what ever name you called it. You should already have a WPA handshake file and Backtrack 5 running. if needed you can copy and past the code just be sure what files will need to be renamed such as the WPA/WPA2 capture itself. Getting a good dictionary can be hard there are some dictionaries within Backtrack 5 that I will use to explain the Brute Force method but there size is limited making them useless against all but the easiest paraphrase.īelow I will show what I have in a video. If the password is easy then it will find it quick, if it is a long paraphrase with many different number letter combinations then it will be much harder. The way this works basically is that there is a large dictionary that you use to throw as many combinations of words as possible at the WPA encryption until it cracks. There are other ways such as Rainbow Tables and the video card attack, but the simplest or easiest way to crack WPA is to use Brute Force. ![]() Unlike WEP, WPA/WPA2 is hard to crack and is usually done with Brute Force. Getting a WPA or WPA2 handshake is great but what do you do once you have finally gotten one? Well it needs to be cracked.
0 Comments
Leave a Reply. |