![]() Let’s SNIFF! Start Monitoring Mode airmon-ng start Monitor and list all networks around you airodump-ng #usually wlan0monīSSID PWR Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSIDĮ4:FB:5D:00:2B:E0 -87 38 1 0 8 130 WPA2 CCMP PSK MYHomeĥ4:39:DF:7C:83:B8 -86 39 0 0 6 130 WPA2 CCMP PSK Qtel-BB1Ĥ8:F9:B3:B7:A2:64 -80 28 1 0 8 195 WPA CCMP PSK BAMB 2ĭ8:48:0B:54:56:0D -84 17 0 0 11 130 WPA2 CCMP PSK Qtel-BB-2Ġ2:26:89:70:BD:1D -84 5 0 0 6 130 WPA CCMP PSK dlink Capturing Packets A WiFi card that supports monitoring mode (promiscuous), here are some examples.CUDA toolkit 9 or later versions for utilizing the GPU cuda cores for cracking.hashcat-utils for converting the output to the proper format for hashcat.Aircrack-ng to sniff the packets and record a WPA handshake.Linux, I’d recommend using Kali or Ubuntu, but it’s totally up to you.The use of nvidia GPU here is due to the huge parallelism that can be achieved with it vs CPU, mainly due to the hundreds/thousands of CUDA cores. So, probably the first thing you do after reading this (or even before reading) is to create a new password for your WiFi network with more than 8 characters, including numbers, a mix of upper & lower case and special characters. ![]() In this post I will be explaining how you could easily brute force ( masked) a weak WPA2 WiFi password that consists only of 8 digits (as many people do) using a local laptop with an old GPU card in a few minutes. The primary aim is to understand how a weak WiFi password can be compromised in a few minutes, if not less. ![]() This post is for educational purposes only and should NOT be used otherwise.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |