Hello World,

The tutorial we are going to walk through Cracking WPA/WPA2 networks which use pre-shared keys. WPA/WPA2 supports many types of authentication beyond Pre-shared keys.But you have to make share that airodum-ng shows the networks for authentication type of PSK, otherwise don’t try to crack it.

Well, in this tutorials we are going to use some Tools/Equipment which we really need to access and crack WPA/WPA2 Wireless Security system.In order to do this you need Wireless adopter called Alfa Network 1000mW High Power Wireless G 802.11g Wi-Fi USB Adapter with 5dBi Antenna AWUS036H


In order to inject Wireless attack you need to know several terms in networking sense, MAC address 00:0F:B5:88:AC:82 Mac address of wireless client using WPA2 For Example 00:0F:B5:FD:FB:C2 and BSSID know as Mac Address of access point 00:14:6C:7E:40:80 and ESSID know as Wireless network name like (Joe, Jhon etc) most important the interface you have selected for ath0 or Wlan0

Note: if you want to change MAC Address of your windows system you can change through this reliable application easily. TMACv6.0.7

Step 1: Start the wireless interface mode into monitor mode

Basic purpose to put your wireless adopter card into mointor mode that your card can listen every packets in the air. usally your card will onlye “Hear” packets addressed to you. By the hearing of every packets we can later capture WPA/WPA2 handshake.cap file. However it also help us to deauthentication of connected client on our network/router.

In-order to enable monitor mode you need to type following cammand in your linux terminal window

Type: airmon-ng 

when you put “airmon-ng” in terminal your interface looks like this as mine.

Interface: Wlan0 and Chipest I’m using Realtek SemiConductor Corp which means I’m using Alpha Wireless adopter


Type: airmon-ng start wlan0

In my case i’m using wireless adopter, now you can see it will be in Monitor mode where you are able to send and received authentication or deauthentication packets.

Step 2: Start airodump-ng to collect authentication handshake file.

For the purpose of this to run airodump-ng to capture handshake.cap file with 4 way authentication.

Type: airodump-ng wlan0mon


Type: airodump-ng -c 11 -w /root/MFJ2k19 –bssid 78:4F:57:D1:7E:92 wlan0mon


-c The network channel address
-w The file name prefix for the file which will contain authentication handshake
-bssid The MAC address of the access point

After this screen appear you need to open another new terminal to initiate another cammand.

Type: aireplay-ng -0 0 -a 65:4F:37:D1:7E:92 wlan0mon

Aireplay-ng will send deauthentication packets to Mac address 65:4F:37:D1:7E:92 for the purpose of capture handshake when it will done you can type simple to stop action Crtl+C, as you can see screen shoot handshake file has been capture and it it located into the root directory of linux /root/home.

Step 3: use Aircrack-ng to handshake.cap capture file using Wordlist Attack

Don’t be get consufed if you don’t know how to make wordlist you can make world list in bulk amount mostly are target based and random, like as hacker if you wanted to hack somone you collect somone of his/her most crticial and personal information like his/her password, hobbies, etc

A tool called Crunch tool will help you out to generate wordlist if you really wana know how to do it soon i will upload post regarding this subject.

well comming to the point, now you have to type a command called 

Type:  aircrack-ng -w /root/Desktop/faraz.txt /root/Desktop/MFJ2k19-02.cap 

Note: Before do this process copy Hanshake.cap file and wordlist.txt file to desktop as /root/Desktop. otherwise this command will not work.

As you can see i have crack my routher password which is on WPA/WPA2 and wordlist i have generate for this works perfect and found the keys inside it this attacks takes times too if you have wordlist size like 1TB etc its brute forcce attack and number of keys applied in every secend to match exact password in the wordlist file. hope you get this post clearly if you have any question comments section availabe for you.

Author Profile

Muhammad Faraz Jamil
Hello! I’m Muhammad Faraz Jamil, having couple of years work experience in WordPress Designing and Development & Customization, committed to working with responsibility, honest and my intention to get client’s entire satisfaction with my great service. I have proficient with some international institute and mastered in the skills to meet client’s demands and deliver top-notch service. So, I can certify that I will handle any WordPress Website project professionally without invalid excuses. - Thank you