Difference between revisions of "WiFI Pineapple Mark VII: Cracking WPA/WPA2-PSK with a dictionary/brut force attack"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
Line 22: Line 22:
=== Step 1 ===
=== Step 1 ===


Enter these commands in the shell
Log in to Wi-Fi Pineapple Web GUI and open the tab '''Reacon'''''Italic text''[[File:Example.jpg]]


  echo foo
  echo foo

Revision as of 17:51, 23 January 2022

Summary

This Documentation will give you a guide how to retrieve a WPA2-PSK password with the Wi-Fi Pineapple Mark VII combined with the Linux Tool aircrack-ng. The Wi-Fi Pineapple Mark VII will be used to deauthenticate the clients of the victim's Wi-Fi. Simultaneously, the Wi-Fi Pineapple Mark VII will capture the 4-way handshake between client and access point and saves it as a PCAP or Hashcat file. This guide will use Linux to demonstrate how to use aircrack-ng.

Requirements

Mandatory

GNU/Linux

  • Install aircrack-ng suite: sudo apt install aircrack-ng

To complete these steps, you must have followed WiFI Pineapple Mark VII: Initial Setup before.

Optional

Hashcat

Description

Step 1

Log in to Wi-Fi Pineapple Web GUI and open the tab ReaconItalic textExample.jpg

echo foo
echo bar

Step 2

Make sure to read

  • War and Peace
  • Lord of the Rings
  • The Baroque Cycle

Used Hardware

WiFi Pineapple Mark VII

Courses

References