304
◾
Ethical Hacking and Penetration Testing Guide
Cracking WPA/WAP2
Now that we have all the inputs required for cracking the WPA/WPA PSK, we will use aircrack-
ng and specify a wordlist that would be used against the rhawap.cap file that was generated earlier.
Remember that in order for us to successfully crack the WPA/WPA2 PSK,
we need to make sure
that our file contains the four-way handshake.
Structure
aircrack-ng –w Wordlist ‘capture_file’.cap
Command
:
aircrack-ng rhawap.cap –w/pentest/passwords/wordlists/darkc0de.lst
So, now this will start the dictionary attack against the rhawap.cap file, and if the key is found
in
the dictionary, it will reveal it to us.