

The WPA handshake would be captured from this and displayed, as shown below. This is when the packets sent by the client will be captured by the tool. Below is a screen screenshot of a client connected to an access point.Īfter this, the client will try to connect to the Wi-Fi network again. This will disconnect the client from the access point.
#Steps to crack wpa2 kali mac#
Optionally, add the client MAC address by adding the -c command line flag, where the part is to be replaced by the MAC address unique to the client. The command for that would be aireplay-ng -deauth 10 -a interface

bssid: it has been indicated with a red mark in the screenshot. Įxplanation of the flags (or options) used in the command: The final command in this step will be airodump-ng -c channel -bssid -w wlan0mon. Add some more parameters to the airodump-ng command.Note: Do not close this terminal because it will be used to know whether the WPA handshake has been captured or not. It will also gather data from the wireless packets. This command captures the network packets. Use the command airodump-ng wlan0mon, as shown below, to display all the access points in the computer's proximity, including the clients connected to that access point.Note: Use the wireless interface, which is indicated by the red mark in the above screenshot. Using the interface in the terminal, use wlan0mon. If there are any such errors, the command airmon-ng check kill should be used to kill the process as shown below.Įnable the monitor mode in the Wi-Fi card (wlan0) by using the command airmon-ng start wlan0 (interface of wireless card). If connected to an external wireless card, it may be wlan1 or even wlan2.įor certain wireless cards, some error messages may be shown (for example, enable monitor mode error). In this case, *wlan0* is the name of the wireless adapter, which may vary depending on the system configuration. In the terminal, use the iwconfig to determine the name of the wireless adapter, as there may be multiple wireless network interfaces on the system.Steps to crack Wi-Fi WPA/WPA2 passwords using Aircrack-ng The goal here is to capture the WPA/WPA2 authentication handshake by sending de-authentication packets to crack the pre-shared key using the aircrack-ng tool. It is worthwhile to mention that if no one is connected to the target Wi-Fi network, it won't be possible to crack it, as it won't be possible to perform a WPA/WPA2 handshake without a client being connected to the network. Then it needs to be determined whether the victim is connected to the target Wi-Fi network. Wi-Fi works by transmitting network packets, which can be captured and dumped using airodump-ng, part of aircrack-ng.
#Steps to crack wpa2 kali how to#
To understand how to crack Wi-Fi, one needs to know how Wi-Fi works. To crack the Wi-Fi network password, the PC/computer should have an external wireless card capable of running a monitor or injection mode.Kali Linux can be A) installed or B) used in the Live version through a Bootable version or C) installed on a VM using VMWare or Virtual Box.In this post, Aircrack-ng will be used to crack a password-protected WPA/WPA2 Wi-Fi network. It is capable of monitoring (capturing packets), attacking, and cracking Wi-Fi networks. Aircrack-ng is a set of tools in Kali Linux that can be used to assess Wi-Fi network security.
