Laughter is the Best Medicine

How to Crack WPA2 WiFi Password in less than A Second | Kali Linux

In this video – we are going to learn about
cracking WiFi passwords in less than a second with coWPAtty and genpmk tools in Kali Linux. But the process for this
is not only for a second. The process before the cracking takes time. So, first thing first, my PC’s internal WiFi card doesn’t
support monitor mode and packet injection that’s why I am using an external
WiFi Card on wlan1 interface. With “airmon-ng start wlan1” command
enable monitor mode on the WiFi card. Now another thing is – you must know essid or name
of the target WiFi network and channel of the WiFi Network. If you don’t know about these
then you can use iwlist tool and airodump tool as well. But I use iwlist tool with wlan0 interface. You can find more information about WiFi
which networks are appearing on this WiFi card like bssid or mac address, channel,
and essid of the WiFi. When you get this information
you will capture a 4-way handshake first. There are many tools and methods available
to capture a 4-way handshake but we will use the easiest method
with the besside tool. You can use the help menu to find out options
to use. For example: you can use target WiFi mac address
with -b option, and target WiFi essid as well with -R option -c option for WiFi channel,
-W option for attack WPA WiFi only. Now use these options, first type besside-ng -R
then specify essid of the WiFi if WiFi has space in name then type it between quotation marks (“wifi name”) -c – channel of the WiFi then -W for WPA WiFi and monitor mode enabled wlan interface
then press enter. Here is a thing – you must do it on your WiFi
not anyone’s WiFi because without the written permission of WiFi Owner
this is illegal. When you get the “Owned target network”
then stop the process with “Ctrl + C” shortcut because it has captured a 4-way handshake. And the first thing is – this is one of the
quickest methods to capture a 4-way handshake and it will save in the current active directory
on the terminal. Now you have three files inside the log file you will get the information
about captured 4-way handshakes list I hope you have your target WiFi name listed in this file. We only need WPA cap file, not log and WEP files,
so you should keep these, but I get rid of these. If you are not sure about 4-way handshake of the target
WiFi is inside the cap file or not then you can use aircrack tool as well. Yeah, there is a WPA 4-way handshake available. There are tools available – cowpatty and genpmk
one of the WiFi Password cracking tools which we use in this video. First, we use genpmk tool to create a rainbow
table or you can call it hash file as well but you need wordlist to create this hash file and I am going to use this custom wordlist
created with cupp script and one of the best common used password list
I will use. And, to download these wordlists
links are available the pinned comment. When you look for help menu in genpmk tool
you will find this is a small tool there we use -f option to specify a wordlist -d for save a file and -s option to specify an essid of the target WiFi. Now type genpmk -f then specify the wordlist
which you want to use. Then -s option to specify WiFi essid or name if essid has space then put it between quotation marks
like this one. Then -d option to save rainbow table as a output file
you can use name whatever you like. Now, press enter, and, this process takes
time, it is depend on passwords in the wordlist, if you picked a wordlist like rockyou and darkc0de
then it will take too much time. Here I want to use another wordlist which I have created
with the victim’s personal information and you can add more WiFi essid
and passwords list as well in the same hash file if you like otherwise, you should leave it. When the rainbow table file is ready
then you can start cracking. To crack the WiFi password with genpmk hash file
we use cowpatty tool with -d option, and you can use a direct dictionary attack (-f)
with a hash file. With both options we must specify
a 4-way handshake file with -r and -s for essid of a WiFi. First, we try with hash file so type cowpatty -r then specify a handshake file path I have on Desktop and the terminal also
active on Desktop, so I just use the file name. Then -d and specify the hash file path
that we have created. And after it – specify the essid of target WiFi with -s option
then press enter. As you can see, this password has cracked
in less than a second and the speed for password cracking is around
160000 passwords per second. And, you can use a wordlist as well to crack the WiFi
password with the cowpatty tool just replace the -d option with -f
and specify a wordlist. So, I hope this video is helpful to you. And thanks for watching 🙂

2 thoughts on “How to Crack WPA2 WiFi Password in less than A Second | Kali Linux

  1. ⚡️ Download Wordlists:

    Make More Wordlists:

    Watch More Videos


Leave a Reply

Your email address will not be published. Required fields are marked *