Hello World,

The tutorial we are going to walk through Cracking WPA/WPA2 networks which use pre-shared keys. WPA/WPA2 supports many types of authentication beyond Pre-shared keys.But you have to make share that airodum-ng shows the networks for authentication type of PSK, otherwise don’t try to crack it.

Well, in this tutorials we are going to use some Tools/Equipment which we really need to access and crack WPA/WPA2 Wireless Security system.In order to do this you need Wireless adopter called Alfa Network 1000mW High Power Wireless G 802.11g Wi-Fi USB Adapter with 5dBi Antenna AWUS036H


In order to inject Wireless attack you need to know several terms in networking sense, MAC address 00:0F:B5:88:AC:82 Mac address of wireless client using WPA2 For Example 00:0F:B5:FD:FB:C2 and BSSID know as Mac Address of access point 00:14:6C:7E:40:80 and ESSID know as Wireless network name like (Joe, Jhon etc) most important the interface you have selected for ath0 or Wlan0

Note: if you want to change MAC Address of your windows system you can change through this reliable application easily. TMACv6.0.7

Step 1: Start the wireless interface mode into monitor mode

Basic purpose to put your wireless adopter card into mointor mode that your card can listen every packets in the air. usally your card will onlye “Hear” packets addressed to you. By the hearing of every packets we can later capture WPA/WPA2 handshake.cap file. However it also help us to deauthentication of connected client on our network/router.

In-order to enable monitor mode you need to type following cammand in your linux terminal window

Type: airmon-ng 

when you put “airmon-ng” in terminal your interface looks like this as mine.

Interface: Wlan0 and Chipest I’m using Realtek SemiConductor Corp which means I’m using Alpha Wireless adopter


Type: airmon-ng start wlan0

In my case i’m using wireless adopter, now you can see it will be in Monitor mode where you are able to send and received authentication or deauthentication packets.

Step 2: Start airodump-ng to collect authentication handshake file.

For the purpose of this to run airodump-ng to capture handshake.cap file with 4 way authentication.

Type: airodump-ng wlan0mon


Type: airodump-ng -c 11 -w /root/MFJ2k19 –bssid 78:4F:57:D1:7E:92 wlan0mon


-c The network channel address
-w The file name prefix for the file which will contain authentication handshake
-bssid The MAC address of the access point

After this screen appear you need to open another new terminal to initiate another cammand.

Type: aireplay-ng -0 0 -a 65:4F:37:D1:7E:92 wlan0mon

Aireplay-ng will send deauthentication packets to Mac address 65:4F:37:D1:7E:92 for the purpose of capture handshake when it will done you can type simple to stop action Crtl+C, as you can see screen shoot handshake file has been capture and it it located into the root directory of linux /root/home.

Step 3: use Aircrack-ng to handshake.cap capture file using Wordlist Attack

Don’t be get consufed if you don’t know how to make wordlist you can make world list in bulk amount mostly are target based and random, like as hacker if you wanted to hack somone you collect somone of his/her most crticial and personal information like his/her password, hobbies, etc

A tool called Crunch tool will help you out to generate wordlist if you really wana know how to do it soon i will upload post regarding this subject.

well comming to the point, now you have to type a command called 

Type:  aircrack-ng -w /root/Desktop/faraz.txt /root/Desktop/MFJ2k19-02.cap 

Note: Before do this process copy Hanshake.cap file and wordlist.txt file to desktop as /root/Desktop. otherwise this command will not work.

As you can see i have crack my routher password which is on WPA/WPA2 and wordlist i have generate for this works perfect and found the keys inside it this attacks takes times too if you have wordlist size like 1TB etc its brute forcce attack and number of keys applied in every secend to match exact password in the wordlist file. hope you get this post clearly if you have any question comments section availabe for you.

Author Profile

Muhammad Faraz Jamil
I am a passionate Web Developer and WordPress Expert who has completed a Masters in Accounting & Finance. I have exceptional technical and analytical skills, with expertise in WordPress, PHP, MySQL, HTML, CSS, JavaScript, JQuery, Google Cloud Computing and profound knowledge of SEO, Keywords Research, Competitor Analysis, and Content Writing. Additionally, I have worked extensively in developing websites and comprehend the capabilities of different browsers. Furthermore, I am competent in building strategies regarding Cloud Server Working Virtually on VM or VMBOX too.
Share via
Copy link
Powered by Social Snap