How To Crack WPA2 WiFi Password With AirCrack-NG - WiFi Pentesting Video 2023

preview_player
Показать описание
Join this channel to get access to perks:

#hacking #hacker #cybersecurity
How To Capture And Crack WPA2 WiFi HandShake With AirCrack-NG - WiFi Pentesting Video 2023

Use Coupon Code INFOSECPAT for 10% off

Stay Protected online with NordVPN:
Nord Links

💸Support The Channel💸
___________________________________________
Please join as a member and help grow the channel. I would appreciate it so much and join the family.

📱Social Media📱

My Channel Is About Free Cybersecurity Education and Lives With Others In The Field
🔥YOUTUBE ALGORITHM ➡ Like, Comment, Share & Subscribe!

Disclaimer:

All my videos are for learning and education purposes. Please always have permission to do an assessment on your target or client. I do all my videos in my home lab. I have full permission to my home network lab and VMs. Thank you and let's have fun learning together!
Рекомендации по теме
Комментарии
Автор

You can use aircrack, wifite, reaver, etc.. but all these method will only work if the wordlist being used has to have the actual password within in or else its useless. So for those reading don’t assume that your breaking into everyone’s wifi using this method as it did his, the password to his network he already added into a wordlist that he used to basically cross reference using aircrack nothing special.

tznutz
Автор

If you capture a Handshake or a PMKID with Airgeddon, you choose the WPA/WPA2 Offline Decryption Menu option and then you choose the option: Aircrack + Crunch Brute force attack on the Handshake/PMKID capture file, it tells me to write the length of the key, how do you know the length of the key?
How do you know if it has only uppercase letters, if it has only lowercase letters, if it has only numbers, if it has only symbols or if the key has characters of all types?

bakuninulianov
Автор

The deauth doesnt appear to be limiting my victim device in any way, and im not able to capture the handshake at all, even if i manually reconnect my victim device.
The MAC adresses for both the AP and the victim device are correct, but the victim device still has internet, and no handshake is ever captured..
I already "hacked" it by using Fern, but with a custom wordlist that included the wifi pwd on purpose, just to test that it worked - so in theory it should work using AirCrack too..

Any advice? :)


Oh, and any tips for how i could bruteforce instead of using a wordlist too? :D 💜

prodKossi
Автор

The final part is the most haunting because the cracking process is not as easy as it might look so your best bet is to create your own password list using crunch if you already know a thing or two about the target or you can crack the password online with servers equipped with very fast GPUs but this last choice will cost you money. Personally I prefer to use CRUNCH combined with a good computer that has a powerful GPU and a lot of ram

linux-fu
Автор

I remember doing this in 2010 with WEP passcodes and Linux BackTrack

kevindodimead
Автор

Would be helpful if you explained what the switches are

carfo
Автор

Please make a video on channel changing issue in airodump-ng because no video on YouTube regarding this issue

ankushsharma
Автор

second time going over this video in conjunction with many other leading ethical hacking/ kali linux videos and i appreciate your thoroughness in explanation and the way you show it as well. keep it up .

MicTheXception
Автор

I have a router that creates a guess wireless network.. where they connect and it brings them to a web page and they have to enter the password. How can I approach getting access into this router via that route

MapleJokerRofl
Автор

Im at that point of life again where i think i can become a hacker

XxxSpud
Автор

In the de authentication process, how do I know what's my access point?

Study_with_MeE
Автор

I did not understand how to activate the new tab because I opened a new tab, turned on the root, and followed the steps, but it did not work

gbhipdv
Автор

Been doing this kind of work since 97. I like your style my man. Cheers

antoniosebastian
Автор

In the last click. They given me that message (Failed to open Capture-Par-01.cap (2):No such file or directory

Sjtklmh
Автор

hello. after running command "airodump-ng wlan0" my wifi adapter doesn't showing me clients. do you know what to do.please help me my wifi adapter is in monitor mode.

technicalgamer
Автор

My bsssid. Doesn’t have any stations after I ran a airodump-c capture even though I have my phone and other devices connected to the network… pls any idea on what to do

jeffersonmbawike
Автор

Bro i did all the steps carefully but doesn't found any eapol file and because of it i can't run dictionary attack on it

ShubhamGupta-xpik
Автор

When ever i try to send death packets i keep getting bssid not found

oppie
Автор

Additional note: If you want to get only the pcap file and not every other crap add - -output-format pcap

kevinm.
Автор

i dont know if these password lists will ever find anything.. i mean even if i use Rockyou that has 14 million passwords.. it's still not gonna have my password. I only have my wife's name and some numbers and characters and still didn't find it.. i mean not all lists will have it all..

MikeSanders