Cracking WPA2 Handshake
This section will cover how to crack a WPA2 handshakes captured with the previously showcased attack vector
Cracking
We need to convert the captured .pcap file into .hccapx format in order to start cracking with it. There's a tool named cap2hccapx which can help us do this. However, we first need to download and compile it on our unix system.
Compiling cap2hccapx
Downloading Source
wget https://raw.githubusercontent.com/hashcat/hashcat-utils/master/src/cap2hccapx.c
Compiling Tool

Testing Tool

Converting
Now that we have the tool compiled and ready to go, we can convert the file and prep it for cracking!

Cracking with .hccapx
I'll be using Hashcat for the cracking on my host machine. Here's a post where I explain why cracking on the host machine is better 😊!

e46f13faade0:c6adf262679d:Nee2.4:tinkerbell
tinkerbell is the PSK of the network in question
We were successfully able to crack the handshake and retrieve the password to the lab network!
Last updated
Was this helpful?