• We just launched and are currently in beta. Join us as we build and grow the community.

Full WiFi Cracking Guide using Wifite & Hashcat

Namdeath

Container Optimization Pro
N Rep
0
0
0
Rep
0
N Vouches
0
0
0
Vouches
0
Posts
129
Likes
20
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 400 XP
Wifite2 — is an excellent tool for automated attack on WPA/WPA2 networks. It contains all the best things a human could invent in terms of network hacking — exploiting vulnerabilities, bruteforce WPS, and intercepting a 4-way handshake, a kind of Swiss knife in the world of wardriving.
Preparing
In order to hack WiFi, you need a WiFi adapter that supports monitoring mode. If you have a laptop, you probably have one. You can check for sure by searching for information about your network adapter or by trying to run the wifite2 tool described below. If your network adapter does not support monitoring mode, you will not be able to run the program.
So, let’s start with the tools. We are going to use:It is assumed that you use a Linux system, but in the case of Windows, you can use the platform WSL. If WSL you are not satisfied, but do not want to use Linux on a regular basis, you can use a bootable flash drive with Kali Linux. Details on the installation can be found on the official Kali https://www.kali.org.
Let’s start by installing Wifite2. On Ubuntu-based systems, this is very easy:
Code:
Code:
sudo apt-get update
sudo apt-get install wifite
If you are using another Linux distribution you can download and run the source code. The launch process is described by the authors.
Important note! Make sure that you installed wifite version 2, that is, wifite2. The first version contains bugs and is no longer supported by the developers.
Hashcat installation:
Code:
Code:
sudo apt-get install hashcat
The sources can be found at this link. And now that both tools are installed, let’s get to work.
Serching for networks.
Run wifite. This can be done by entering the appropriate command into the terminal:
Code:
Code:
wifite
# or
wifite2
If your network adapter supports monitoring mode, you will lose your Internet connection and the terminal will look like this:
Code:
hashcat -m 22000 <file_path> -a 3 ?d?d?d?d?d?d?d?d
8 digits — the mask of the most popular password for WiFi networks, especially in older routers. It is this mask that is shown in the argument “?d?d?d?d?d?d?”.
hashcat will let you know if it manages to find the password. If not, it is still possible to use the online service described above.
Read more about hashcat and WiFi hacking https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2.
 

449,193

322,229

322,238

Top