How To Capture Handshakes In Kali Linux

Here is a very simple tutorial on capturing wireless network or wifi router handshakes in Kali Linux. There are N number of methods to capture handshakes, everything works but you need to enter some commands and make them work. I don’t want you to go through all that. So, here is a tutorial on capturing wifi handshake to crack a wpa/wap2 wifi password through brute force. After capturing the Handshake all you need to do is attach it with a wordlist and perform a brute force attack using aircrack-ng


What is Handshake file and why do we require a Handshake File

1. A Handshake is a negotiation between a server and a client or a user and a router
2.   Can be used to hack WPA/WPA2 wifi router passwords
3.   Handshake file can be used to perform brute force or dictionary attack
4. Once a handshake is captured, you can try to decrypt (brute force) the password N number of times.


     1.   Kali Linux Installed (Better to use Live Boot)
2.   4GB or Above Pen drive
3.   Kali Linux Live Boot

How To Capture  a Router Handshake in Kali Linux Using Wifite 

Step 1. Open your Terminal and type “ifconfig” to check your interface configuration. “wlan0” or “wlan0mon” should be running to detect a wireless network and capture a handshake file.

Step 2. Now we need to start our interface. So, type “airmon-ng start wlan0”; use your interface name instead of wlan0, mostly it will be wlan0mon

Step 3. Start a new terminal and type “wifite”. Wifite starts running and gives you almost similar output as in the snapshot

Step 4. A list of available networks near you are shown in the wifite terminal. Wait for few minutes and hit “CTRL+C

Step 5. You need to choose the network that you want to hack and enter the number corresponding to it and enter it below. You can choose as many networks as you want just by adding a “,” or “-” between the numbers.

Step 6.  Right after you select a number and hit enter, the first step wifite does is to start capturing a handshake if the network is of WAP/WPA2 security.

Step 7. Wait for few minutes, it’s not gonna take too long If the signal strength is at least medium. It all varies with the signal. Wifite can also perform a dictionary attack, let’s see that in another article. So, for here I will restrict to capturing a handshake only.  You can see that handshake file is captured and saved successfully.

Step 8. Handshake file captured by wifite is stored in “Home/hs” folder  by default
Step 9. When you go into home/hs you can find the handshakefile.cap. This is the final output we are looking for.

Step 10. Now you can use this to crack a Wifi WPA/WPA2 network. This can be done by using wifte, fern wifi cracker, aircrack-ng and many more tools. So, to make things easy here Is a simple tutorial on Cracking Wifi Password using Handshake and Wordlist (Brute Force) using Aircrack-ng inKali Linux

Related Posts :

=============     Hacking Don't Need Agreements     ============
Just Remember One Thing You Don't Need To Seek Anyone's  To Hack Anything Or Anyone As Long As It Is Ethical, This Is The Main Principle Of Hacking Dream
                           Thank You for Reading, Hope It Is Useful 

I Will Be Very Happy To Help You So For Queries or Any Problem Comment Below Or You Can Mail Me At

Bhanu Namikaze

Bhanu Namikaze is an Ethical Hacker, Security Analyst, Blogger, Web Developer and a Mechanical Engineer. He Enjoys writing articles, Blogging, Debugging Errors and Capture the Flags. Enjoy Learning; There is Nothing Like Absolute Defeat - Try and try until you Succeed.

No comments:

Post a Comment