

You should see output similar to what is below. Have a wireless card that supports monitor mode (I recommend this one)īegin by listing wireless interfaces that support monitor mode with:.Are running a debian-based linux distro (preferably Kali linux).Have a general comfortability using the command-line.If you are familiar with this process, you can skip the descriptions and jump to a list of the commands used at the bottom.ĭISCLAIMER: This software/tutorial is for educational purposes only. An optional active deauthentication attack can be used to speed up the reconnaissance process and is described at the end of this document.

The attack outlined below is entirely passive (listening only, nothing is broadcast from your computer) and it is impossible to detect provided that you don’t actually use the password that you crack. It is not exhaustive, but it should be enough information for you to test your own network’s security or break into one nearby.

This is a brief walk-through tutorial that illustrates how to crack Wi-Fi networks that are secured using weak passwords. Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat.
