Difference between revisions of "WiFI Pineapple Mark VII: Cracking WPA/WPA2-PSK with a dictionary/brut force attack"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
(Created page with "== Summary == Description what this documentation is about. == Requirements == * Operating system: Ubuntu 18.04 bionic amd64 * Packages: git emacs In order to complete th...")
 
Line 1: Line 1:
== Summary ==  
== Summary ==  


Description what this documentation is about.
This Documentation will give you a guide how to retrieve a WPA2-PSK password with the Wi-Fi Pineapple Mark VII combined with the Linux Tool aircrack-ng. The Wi-Fi Pineapple Mark VII will be used to deauthenticate the clients of the victim's Wi-Fi. Simultaneously, the Wi-Fi Pineapple Mark VII will capture the 4-way handshake between client and access point and saves it as a PCAP or Hashcat file. This guide will use Linux to demonstrate how to use aircrack-ng.


== Requirements ==
== Requirements ==


* Operating system: Ubuntu 18.04 bionic amd64
== Mandatory ==
* Packages: git emacs
=== GNU/Linux ===


In order to complete these steps, you must have followed [[Some Other Documentation]] before.
* Install aircrack-ng suite: <code>sudo apt install aircrack-ng</code>
 
To complete these steps, you must have followed [[WiFI Pineapple Mark VII: Initial Setup]] before.
 
== Optional ==
=== Hashcat ===
* Clone GIT repository: <code>git clone https://github.com/hashcat/hashcat.git</code>
* Build: <code>cd ./hashcat && make && make install</code>
* Link: <code>sudo ln -s ./hashcat /usr/local/bin/hashcat</code>


== Description ==
== Description ==
Line 29: Line 37:
== Used Hardware ==
== Used Hardware ==


[[Device to be used with this documentation]]
[[WiFi Pineapple Mark VII]]
[[Maybe another device to be used with this documentation]]


== Courses ==
== Courses ==


* [[A course where this documentation was used]] (2017, 2018)
* [[Campus Cyber Security Team]] WiFi Hacking 28.01.2022
* [[Another one]] (2018)


== References ==
== References ==


* https://wikipedia.org
* https://docs.hak5.org/hc/en-us/articles/360053346334-Setup-Basics
* https://google.com
* https://www.youtube.com/watch?v=evsCXb7XHbM&t=274s&ab_channel=TigTec
* https://www.aircrack-ng.org/
* https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2
* https://coders.ph/post/how-to-use-aircrack-ng-to-bruteforce-wpa2-passwords


[[Category:Documentation]]
[[Category:Documentation]]

Revision as of 17:44, 23 January 2022

Summary

This Documentation will give you a guide how to retrieve a WPA2-PSK password with the Wi-Fi Pineapple Mark VII combined with the Linux Tool aircrack-ng. The Wi-Fi Pineapple Mark VII will be used to deauthenticate the clients of the victim's Wi-Fi. Simultaneously, the Wi-Fi Pineapple Mark VII will capture the 4-way handshake between client and access point and saves it as a PCAP or Hashcat file. This guide will use Linux to demonstrate how to use aircrack-ng.

Requirements

Mandatory

GNU/Linux

  • Install aircrack-ng suite: sudo apt install aircrack-ng

To complete these steps, you must have followed WiFI Pineapple Mark VII: Initial Setup before.

Optional

Hashcat

Description

Step 1

Enter these commands in the shell

echo foo
echo bar

Step 2

Make sure to read

  • War and Peace
  • Lord of the Rings
  • The Baroque Cycle

Used Hardware

WiFi Pineapple Mark VII

Courses

References