Thursday, May 12, 2016

Retrieving WPA key with CRUNCH



Hello, I'm not going to discuss handshakes since I guess you all are familiar with airmon, airodump and aireplay and now how to get them.

Tthat's about the first step in retrieving WPA and the easy job. The hard job is to actually crack the WPA key from the capfile.

I was looking for a method that is full proof without actually storing a huge wordlist on your desktop (talking about lots of lots of terrabites).

So i came up with the following:

# crunch 0 25 abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWX YZ0123456789 | aircrack-ng --bssid aa:aa:aa:aa:aa:aa -w- handshakefile.cap

(Notice there is a space in the command that shouldnt be there, i guess the forum can't handle 62characters word).

Meaning that crunch is making a list with minimum 0 and maximum 25 characters with alfanumeric small and cap characters that are not stored in a wordlistfile.

The "|" ends the crunch command and then we go to the aircrack command:
With the bssid of the "victim" (notice you have to be authorised by the victim to do the test) and -w- wich specifies the handshake.cap file.


Hope you enjoy this retrieving method.. Please leave comment if you like this.

No comments:

Post a Comment

Featured Post

RAR password retrieving with cRARk

cRARk is a .rar archive password retriever, but unlike rarcrack, can be customised to a far greater extent to allow partial passwords, wo...