Difference between revisions of "WiFI Pineapple Mark VII: Cracking WPA/WPA2-PSK with a dictionary/brut force attack"
Jump to navigation
Jump to search
(Created page with "== Summary == Description what this documentation is about. == Requirements == * Operating system: Ubuntu 18.04 bionic amd64 * Packages: git emacs In order to complete th...") |
|||
Line 1: | Line 1: | ||
== Summary == | == Summary == | ||
This Documentation will give you a guide how to retrieve a WPA2-PSK password with the Wi-Fi Pineapple Mark VII combined with the Linux Tool aircrack-ng. The Wi-Fi Pineapple Mark VII will be used to deauthenticate the clients of the victim's Wi-Fi. Simultaneously, the Wi-Fi Pineapple Mark VII will capture the 4-way handshake between client and access point and saves it as a PCAP or Hashcat file. This guide will use Linux to demonstrate how to use aircrack-ng. | |||
== Requirements == | == Requirements == | ||
== Mandatory == | |||
=== GNU/Linux === | |||
* Install aircrack-ng suite: <code>sudo apt install aircrack-ng</code> | |||
To complete these steps, you must have followed [[WiFI Pineapple Mark VII: Initial Setup]] before. | |||
== Optional == | |||
=== Hashcat === | |||
* Clone GIT repository: <code>git clone https://github.com/hashcat/hashcat.git</code> | |||
* Build: <code>cd ./hashcat && make && make install</code> | |||
* Link: <code>sudo ln -s ./hashcat /usr/local/bin/hashcat</code> | |||
== Description == | == Description == | ||
Line 29: | Line 37: | ||
== Used Hardware == | == Used Hardware == | ||
[[ | [[WiFi Pineapple Mark VII]] | ||
== Courses == | == Courses == | ||
* [[ | * [[Campus Cyber Security Team]] WiFi Hacking 28.01.2022 | ||
== References == | == References == | ||
* https:// | * https://docs.hak5.org/hc/en-us/articles/360053346334-Setup-Basics | ||
* https:// | * https://www.youtube.com/watch?v=evsCXb7XHbM&t=274s&ab_channel=TigTec | ||
* https://www.aircrack-ng.org/ | |||
* https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2 | |||
* https://coders.ph/post/how-to-use-aircrack-ng-to-bruteforce-wpa2-passwords | |||
[[Category:Documentation]] | [[Category:Documentation]] |
Revision as of 17:44, 23 January 2022
Summary
This Documentation will give you a guide how to retrieve a WPA2-PSK password with the Wi-Fi Pineapple Mark VII combined with the Linux Tool aircrack-ng. The Wi-Fi Pineapple Mark VII will be used to deauthenticate the clients of the victim's Wi-Fi. Simultaneously, the Wi-Fi Pineapple Mark VII will capture the 4-way handshake between client and access point and saves it as a PCAP or Hashcat file. This guide will use Linux to demonstrate how to use aircrack-ng.
Requirements
Mandatory
GNU/Linux
- Install aircrack-ng suite:
sudo apt install aircrack-ng
To complete these steps, you must have followed WiFI Pineapple Mark VII: Initial Setup before.
Optional
Hashcat
- Clone GIT repository:
git clone https://github.com/hashcat/hashcat.git
- Build:
cd ./hashcat && make && make install
- Link:
sudo ln -s ./hashcat /usr/local/bin/hashcat
Description
Step 1
Enter these commands in the shell
echo foo echo bar
Step 2
Make sure to read
- War and Peace
- Lord of the Rings
- The Baroque Cycle
Used Hardware
Courses
- Campus Cyber Security Team WiFi Hacking 28.01.2022