Aircrack-ng
Command to brutefore the WPA Handshakes using Aircrack-ng
The above cmd is used to perform a dictionary attack to crack WPA2 encryption on a captured wireless network traffic file. It attempts to recover the WPA2 key using a wordlist.
-a2
: Specifies the attack mode for WPA2.-b [Target BSSID]
: Specifies the MAC address (BSSID) of the target access point.-w /home/attacker/Desktop/Wordlist/password.txt
: Specifies the path to the wordlist file to be used for the dictionary attack.
Setting up the monitor mode adapter

Cracking hashes stored in a file :
Last updated