Cracking WPA2 Handshake
This section will cover how to crack a WPA2 handshakes captured with the previously showcased attack vector
Last updated
This section will cover how to crack a WPA2 handshakes captured with the previously showcased attack vector
Last updated
We need to convert the captured .pcap
file into .hccapx
format in order to start cracking with it. There's a tool named cap2hccapx
which can help us do this. However, we first need to download and compile it on our unix system.
Downloading Source
Compiling Tool
Testing Tool
Now that we have the tool compiled and ready to go, we can convert the file and prep it for cracking!
I'll be using Hashcat for the cracking on my host machine. Here's a post where I explain why cracking on the host machine is better 😊!
e46f13faade0:c6adf262679d:Nee2.4:tinkerbell
tinkerbell is the PSK of the network in question
We were successfully able to crack the handshake and retrieve the password to the lab network!