Crack Wi-Fi With WPA/WPA2-PSK Using Aircrack-Ng
Crack Wi-Fi With WPA/WPA2-PSK Using Aircrack-Ng
Aircrack-ng
Penetration
With the help a these commands you will be able to crack WPA/WPA2 Wi-Fi
Access Points which use PSK (Pre-Shared Key) encryption.
http://www.aircrack-ng.org
So, the correct interface name to use in later parts of the tutorial is mon0.
All of the visible APs are listed in the upper part of the screen and the clients are
listed in the lower part of the screen :
Option Description
The file name prefix for the file which will contain
-w
authentication handshake
After some time you'll notice the WPA handshake: 00:11:22:33:44:55 in the top
right-hand corner of the screen.
Option Description
Master Key : 5C 9D 3F B6 24 3B 3E 0F F7 C2 51 27 D4 D3
0E 97
CB F0 4A 28 00 93 4A 8E DD 04 77 A3 A1 7D
15 D5
Transient Key : 3A 3E 27 5E 86 C3 01 A8 91 5A 2D 7C 97 71
D2 F8
AA 03 85 99 5C BF A7 32 5B 2F CD 93 C0 5B
B5 F6
DB A3 C7 43 62 F4 11 34 C6 DA BA 38 29 72
4D B9
A3 11 47 A6 8F 90 63 46 1B 03 89 72 79 99
21 B3
EAPOL HMAC : 9F B5 F4 B9 3C 8B EA DF A0 3E F4 D4 9D F5
16 62
In some cases, it's not possible to crack WPA/WPA2-PSK key in one step, especially
while using a large dictionary. Combine Aircrack-ng with John The Ripper to
Pause/Resume Cracking.
aircrack-ng
crack
autentification
wireless
wifi
security
password
RELATED ARTICLES
cudaHashcat or oclHashcat or Hashcat on Kali Linux got built-in capabilities to attack and
decrypt or Cracking WPA2 WPA with Hashcat – handshake .cap files. Only constraint is, you
need to convert a .cap file to a .hccap file format. This is rather easy.
Hashcat
Hashcat is the self-proclaimed world’s fastest CPU-based password recovery tool. It is available
free of charge, although it has a proprietary codebase. Versions are available for Linux, OSX, and
Windows and can come in CPU-based or GPU-based variants. Hashcat currently supports a large
range of hashing algorithms, including: Microsoft LM Hashes, MD4, MD5, SHA-family, Unix
Crypt formats, MySQL, Cisco PIX, and many others.
Hashcat has made its way into the news many times for the optimizations and flaws discovered
by its creator, which become exploited in subsequent hashcat releases. (For example, the flaw in
1Password’s hashing scheme.)
Attack types
Hashcat offers multiple attack modes for obtaining effective and complex coverage over a hash’s
keyspace. These modes are:
Brute-Force attack
Combinator attack
Dictionary attack
Fingerprint attack
Hybrid attack
Mask attack
Permutation attack
Rule-based attack
Table-Lookup attack
Toggle-Case attack
The traditional bruteforce attack is considered outdated, and the Hashcat core team recommends
the Mask-Attack as a full replacement.
Variants
Hashcat comes in two main variants:
Hashcat – A CPU-based password recovery tool
oclHashcat – A GPU-accelerated tool
Many of the algorithms supported by Hashcat can be cracked in a shorter time by using the well-
documented GPU-accelerationleveraged in oclHashcat (such as MD5, SHA1, and others).
However, not all algorithms can be accelerated by leveraging GPUs. Bcrypt is a good example of
this. Due to factors such as data dependant branching, serialization, and Memory (to name just a
few), oclHashcat is not a catchall replacement for Hashcat.
Hashcat is available for Linux, OSX and Windows. oclHashcat is only available for Linux and
Windows due to improper implementations in OpenCL on OSX
Important Note: Many users try to capture with network cards that are not
supported. You should purchase a card that supports Kali Linux including
injection and monitor mode etc. A list can be found in 802.11 Recommended USB
Wireless Cards for Kali Linux. It is very important that you have a supported card,
otherwise you’ll be just wasting time and effort on something that just won’t do the
job.
Contents [hide]
Hashcat
o Attack types
o Variants
My Setup
NVIDIA Users:
AMD Users:
Why use Hashcat for cracking WPA WPA2 handshake file?
Built-in charsets
Numbered passwords
Letter passwords – All uppercase
Letter passwords – All lowercase
Passwords – Lowercase letters and numbers
Passwords – Uppercase letters and numbers
Passwords – Mixed matched with uppercase, lowercase, number and
special characters.
Passwords – when you know a few characters
Capture handshake with WiFite
Cleanup your cap file using wpaclean
Convert .cap file to .hccap format
Cracking WPA2 WPA handshake with Hashcat
Dictionary attack
Brute-Force Attack
Sample:
Sample .hcmask file
Location of Cracked passwords
Conclusion
Related
My Setup
I have a NVIDIA GTX 210 Graphics card in my machine running Kali Linux 1.0.6 and will
use rockyou dictionary for most of the exercise. In this post, I will show step on Cracking WPA2
WPA with Hashcat (handshake files) (.cap files) with cudaHashcat or oclHashcat or Hashcat on
Kali Linux.
I will use cudahashcat command because I am using a NVIDIA GPU. If you’re using AMD
GPU, then I guess you’ll be using oclHashcat. Let me know if this assumptions is incorrect.
To enable GPU Cracking, you need to install either CUDA for NVIDIA or AMDAPPSDK for
AMD graphics cards. I’ve covered those in in my previous posts.
NVIDIA Users:
1. Install proprietary NVIDIA driver on Kali Linux – NVIDIA Accelerated Linux Graphics Driver
2. Install NVIDIA driver kernel Module CUDA and Pyrit on Kali Linux – CUDA, Pyrit and Cpyrit-cuda
AMD Users:
1. Install AMD ATI proprietary fglrx driver in Kali Linux 1.0.6
2. Install AMD APP SDK in Kali Linux
Now this doesn’t explain much and reading HASHCAT Wiki will take forever to explain on how
to do it. I’ll just give some examples to clear it up.
Hashcat allows you to use the following built-in charsets to attack a WPA2 WPA handshake
file.
Built-in charsets
?l = abcdefghijklmnopqrstuvwxyz
?u = ABCDEFGHIJKLMNOPQRSTUVWXYZ
?d = 0123456789
?s = !”#$%&'()*+,-./:;⇔?@[\]^_`{|}~
?a = ?l?u?d?s
Numbered passwords
So lets say you password is 12345678 . You can use a custom MASK like ?d?d?d?d?d?d?d?d
What it means is that you’re trying to break a 8 digit number password
like 12345678 or 23456789 or 01567891 .. You get the idea.
Letter passwords – All uppercase
If your password is all letters in CAPS such as: ABCFEFGH or LKHJHIOP or ZBTGYHQS ..etc. then you
can use the following MASK:
?u?u?u?u?u?u?u?u
It will crack all 8 Letter passwords in lowercase. I hope you now know where I am getting at.
abc?d?d?d?d?d
abc?l?u??d??d?l
abc?d?d?l?u?l
There will be 125 combinations in this case. But it will surely break it in time. This is the true
power of using cudaHashcat or oclHashcat or Hashcat on Kali Linux to break WPA2 WPA
passwords.
You can even up your system if you know how a person combines a password. Some people
always uses UPPERCASE as the first character in their passwords, few lowercase letters and
finishes with numbers.
Example: Abcde123
Your mask will be:
?u?l?l?l?l?d?d?d
This will make cracking significantly faster. Social engineering is the key here.
That’s enough with MASK’s. Now let’s capture some WPA2 WPA handshake files. Following
WiFite section was taken from a previous guide Cracking Wifi WPA2 WPA passwords using
pyrit cowpatty in Kali Linux which was one of the best guides about cracking Wifi passwords out
there.
If you want to see everything, ( wep , wpa or wpa2 , just type the following command. It doesn’t
make any differences except few more minutes
wifite
1. [c][/c]
I can type in c to continue or e to exit. This is the feature I was talking about. I typed c to
continue. What it does, it skips choice 1 and starts attacking choice 2. This is a great feature cause
not all routers or AP’s or targets will respond to an attack the similar way. You could of course
wait and eventually get a respond, but if you’re just after ANY AP’s, it just saves time.
And voila, took it only few seconds to capture a handshake. This AP had lots of clients and I
managed to capture a handshake.
This handshake was saved in /root/hs/BigPond_58-98-35-E9-2B-8D.cap file.
Once the capture is complete and there’s no more AP’s to attack, Wifite will just quit and you get
your prompt back.
Now that we have a capture file with handshake on it, we can do a few things.
Please note that the wpaclean options are the wrong way round. < out.cap > < in.cap > instead of
< in.cap > < out.cap > which may cause some confusion.
In my case, the command is as follows:
wpaclean hs/out.cap hs/BigPond_58-98-35-E9-2B-8D.cap
Convert .cap file to .hccap format
We need to convert this file to a format cudaHashcat or oclHashcat or Hashcat on Kali Linux can
understand.
To convert it to .hccap format with “ aircrack-ng ” we need to use the -J option
Dictionary attack
Grab some Wordlists, like Rockyou .
Read this guide Cracking Wifi WPA2 WPA passwords using pyrit cowpatty in Kali Linux for
detailed instructions on how to get this dictionary file and sorting/cleaning etc.
First we need to find out which mode to use for WPA2 WPA handshake file. I’ve covered this in
great length in Cracking MD5, phpBB, MySQL and SHA1 passwords with Hashcat on Kali
Linux guide. Here’s a short rundown:
cudahashcat --help | grep WPA
So it’s 2500.
Now use the following command to start the cracking process:
cudahashcat -m 2500 /root/hs/out.hccap /root/rockyou.txt
Bingo, I used a common password for this Wireless AP. Took me few seconds to crack it.
Depending on your dictionary size, it might take a while.
You should remember, if you’re going to use Dictionary attack, Pyrit would be much much much
faster than cudaHashcat or oclHashcat or Hashcat. Why we are showing this here? Cause we can.
:)
Another guide explains how this whole Dictionary attack works. I am not going to explain the
same thing twice here. Read Cracking MD5, phpBB, MySQL and SHA1 passwords with Hashcat
on Kali Linux for dictionary related attacks in full length.
Brute-Force Attack
Now this is the main part of this guide. Using Brute Force MASK attack.
To crack WPA WPA2 handshake file using cudaHashcat or oclHashcat or Hashcat, use the
following command:
Sample:
cudahashcat -m 2500 -a 3 capture.hccap ?d?d?d?d?d?d?d?d
?d?d?d?d?d?d?d?d = This is your MASK where d = digit . That means this password is all in
numbers. i.e. 7896435 or 12345678 etc.
I’ve created a special MASK file to make things faster. You should create your own MASK file
in similar way I explained earlier. I’ve saved my file in the following directory as blackmoreops-
1.hcmask .
/usr/share/oclhashcat/masks/blackmoreops-1.hcmask
Do the following to see all available default MASK files provided by cudaHashcat or oclHashcat
or Hashcat:
ls /usr/share/oclhashcat/masks/
cat hashcat.pot
Conclusion
This guide explains a lot. But you should read read Wiki and Manuals from www.hashcat.net to
get a better understanding of MASK and Rule based attacks because that’s the biggest strength of
Hashcat.
Thanks for reading. Feel free to share this article.
Related
Cracking MD5, phpBB, MySQL and SHA1 passwords with Hashcat on Kali Linux
In "Cracking"
Leave a Reply
7 thoughts on “Cracking WPA2 WPA with
Hashcat in Kali Linux (BruteForce MASK
based attack on Wifi passwords)”
Pingback: Cracking Wifi WPA/WPA2 passwords using pyrit cowpatty in Kali Linux -
darkMORE Ops
Reply ↓
Reply ↓
Reply ↓
Pingback: 802.11 Recommended USB Wireless Cards for Kali Linux - blackMORE Ops
Search
Search for:
Recent Posts
Attack a website using slowhttptest from Linux and Mac
Remote DSL ADSL router hack using NMAP in Kali Linux
Use SQLMAP SQL Injection to hack a website and database in Kali Linux
Recent Comments
服务器网卡收包性能测试 | Jasey Wang on Denial-of-service Attack – DOS using hping3 with
spoofed IP in Kali Linux
bazin on Remote DSL ADSL router hack using NMAP in Kali Linux
blackMORE Ops on Cracking WPA2 WPA with Hashcat in Kali Linux (BruteForce MASK based
attack on Wifi passwords)
blackMORE Ops on Use SQLMAP SQL Injection to hack a website and database in Kali Linux
Archives
September 2014
August 2014
Categories
Cracking
DOS
Hacking
Hashcat
hping3
Kali Linux
Linux
Metasploits
Reaver
Router
SQL Injection
SqlMap
Wifi
Windows
Wireless
RSS Feed
RSS - Posts
RSS - Comments
· © 2014 darkMORE Ops · Designed by Themes & Co ·
Back to top