How to crack a wpa2

Password cracking for WiFi networks is one of the hacking activities that most interest beginner researchers, cybersecurity experts and sporadic users alike and, although it is possible to lớn find information about it online, sometimes this is unclear và may not be aimed at the right audience.

Bạn đang xem: How to crack a wpa2

That is why the experts of the cybersecurity course of the International Institute of Cyber Security (IICS) how lớn complete these tasks relatively easily và in just a few steps. To vì this, we will use the utility known as coWPAtty, which simplifies và accelerates conventional dictionary attacks.


Before continuing, we remind you as usual that this article was prepared for informational purposes only và should not be taken as a điện thoại tư vấn to action. IICS is not responsible for the misuse that may occur to the information contained herein.

Step 1: Find coWPAtty

The utility is included by mặc định in the Kali Linux software package, although it is not in the /pentest/wireless directory. According to the experts of the cybersecurity course, the application resides in the /usr/local/bin folder, which we will xuất hiện below.


Since the utility is in the /usr/local/bin directory, it can be launched from any folder on Kali Linux.

Step 2: Use the coWPAtty help screen

For a brief mô tả tìm kiếm of the available options, the cybersecurity course experts recommend only typing the following command:


*

Then, Kali Linux will display a small help screen. Remember that coWPAtty requires some data to work properly:

Word listFile with password hashingAccess point SSID to lớn hack

Step 3: Switch the wireless adapter to lớn monitor mode

Like other hacking tools, coWPAtty requires changing the WiFi adapter lớn monitor mode to get the password, mention the experts of the cybersecurity course.

Let’s run the following code:


*

Step 4: Create a file to intercept

Next, we need to create a file to store the password intercepted during the 4-way handshake. To do this, we will use the following code:


The above command will dump the selected access point (00:25:9C:97:4F:48), the specified channel (-c 9) and save the hash in a tệp tin called cowcrack, say the experts of the cybersecurity course.

Step 5: Handshake Interception

Now we just have to wait for someone khổng lồ connect lớn the compromised access point, which will allow us khổng lồ intercept the hashing. Cybersecurity course experts recommend using Airodump-ng to lớn receive a notification when someone connects to lớn the target network.

Xem thêm: Cách Xem Bóng Đá Bằng Sopcast, Hướng Dẫn Xem Bóng Đá Trực Tuyến Bằng Sopcast


*

Step 6: Run the utility

After getting the password with hashing, we can use coWPAtty along with our word list to get the decrypted key.

Let’s run the following code:


*

The screenshot above shows how coWPAtty generates a hash for each word in our menu with the SSID and compares it khổng lồ the intercepted hash. Once the hash matches, the utility will display the access point password on the screen.

Step 7: Create your own hash

Typically, coWPAtty uses a danh sách of words provided by the user & calculates the hash of each based on the specified SSID, although this task consumes a large amount of processor resources, mention the experts of the cybersecurity course.

Luckily, now the utility has support for working with a ready-to-use hash file, which makes WPA2-PSK password cracking more efficient by more than 1000%. These files are generated using 172,000 dictionary files & 1,000 of the most popular SSIDs. Remember that if your SSID is not included in this list, the feature will not help us. In this case, we must generate our own hash menu from the SSID of the access point used.

Let’s use the following code:


*

Step 8: Using your own hash

After generating a các mục of hashes for a specific SSID, we can start cracking the password by running the following command:


Although not the only utility of its kind, coWPAtty is one of the best options for WiFi password cracking as it is easy lớn use & does not require advanced hacking knowledge.

To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel miễn phí to access the International Institute of Cyber Security (IICS) websites.


vị trí cao nhất 6 không lấy phí steganography tools for cyber security professionals


How to gian lận WhatsApp easily with a very effective Termux WhatsApp phishing trang web


top 10: The best web browsers for cybersecurity specialists


Here’s how hackers remotely attack smartphones: Taking control of victim’s camera and microphone using just 11 commands


How to perform digital forensics of malicious PDF files? Easily checking if a PDF document has malware or backdoors


đứng đầu 6 tools used by hackers for stealing Windows tên miền cache credentials. 5 alternatives of Mimikatz


He is a well-known expert in mobile security và malware analysis. He studied Computer Science at NYU và started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in điện thoại security và mobile vulnerabilities.