You are currently viewing WPA2/PSK Hacking using dictionary attack Tutorial Updated

WPA2/PSK Hacking using dictionary attack Tutorial Updated

WPA2/PSK WIFI HACKING TUTORIAL

I searched and to my surprise didn’t see any quality tutorials on how to hack WPA2/PSK using a dictionary attack so I decided to make one. Hope you guys enjoy it! (if there is tutorials on it I didn’t see them!)  WPA2/PSK Hacking using dictionary attack

Okay so lets get started.

REQUIREMENTS

  • Kali Linux USB
  • Compatible Network Interface Card


First, you want to open up a terminal and put your network card in monitor mode like this. This allows the network interface card to monitor network traffic and capture data packets being sent from the AP
airmon-ng start wlan0
Then use this command to check to see which network interface you have. My interface is wlan0mon but yours could be different. Whichever interface says monitor mode is the one that your going to want to use iwconfig

Then let’s scan for targets with this command. The closer the target the better. You can see the range where it say PWR. The lower the number the closer the AP is to you. I’m going to choose the target Smith_Girls
airodump-ng wlan0mon

After you choose your target note the BSSID and the Channel # and type the following to monitor the network traffic. The page will look like the one below
airodump-ng -c 8 –bssid 90:48:9A:C4:5B:10 -w sinistertutorial wlan0mon

Once you obtain a handshake you are ready to start cracking the password with Aircrack. So go ahead and open up a new terminal and type the following. If the dictionary attack contains the password for the router then you will get a page that looks like this
aircrack-ng -a2 -b 90:48:9A:C4:5B:10 -w rockyou.txt sinistertutorial-01.cap

The rockyou.txt part is the dictionary attack. You can download different dictionaries off the internet and use those if the built-in dictionary that Kali Linux offers does not work. Once it runs through the dictionary it will tell you if you found the password or not. In my case, it found the password rather quickly.

Hope you guys enjoyed the tutorial. I tried to make it as basic and simple as possible for someone to understand isn’t familiar with Linux.

Turn Off Monitor Mode!

If you don’t turn monitor mode back off you cannot browse the internet. Do so by typing the following command
airmon-ng stop wlan0mon
If your having trouble and the Wifi icon at the top right of the screen is gone then type
service network-manager restart
After that everything should work perfectly!

Hope you guys enjoyed the tutorial thanks for viewing it! If you have any questions PM

Henceforth, WE WISH TO ANNOUNCE THAT OUR SERVICES ARE NOT AVAILABLE TO PEOPLE FROM NIGERIA AND INDIA. THESE ARE USELESS TIME WASTERS AND THIEVES TRYING TO BEG OR SCAM US OF OUR PRODUCTS. OUR SERVICES ARE NOT FREE AND PAYMENT IS UPFRONT

A LOT OF FOOLS FROM NIGERIA AND INDIA. on the off chance that YOU DON’T TRUST TO USE OUR SERVICES, DON’T CONTACT US AS WE HAVE NO FREE SERVICE

CONTACT US FOR PURCHASE/INQUIRIES, WE RESPOND ALMOST INSTANTLY 

HI BUYERS, WE ARE A PROFESSIONAL CARDING AND HACKING TEAM. HOVATOOLS HAS BEEN AROUND SINCE THE TIME OF EVO MARKET, ALPHABAY, WALLSTREET MARKET AND MORE. WE REMAIN STRONG AND RELIABLE IN THE INDUSTRY, ALWAYS PROVIDING YOU WITH THE BEST QUALITY TOOLS TO HELP YOU MAKE MONEY AND MAXIMIZE PROFIT IN THE FRAUD GAME.

TO GET STARTED, YOU CAN VISIT OUR ONLINE SHOP/STORE TO BUY EVERYTHING YOU NEED TO START CASHING OUT.  AT THE SHOP YOU GET Accounts & Bank Drops CVV & CARDS DUMPS PERSONAL INFORMATION & SCAN.

BANK HACKING SOFTWARE – WIRE/ACH DARKWEB MONEY TRANSFER HACKERS

Buy Fresh Credit Cards for Carding, BIN LIST Buy Bank Login, RDP, Buy Hacked Paypal accounts. Contact us to buy all tools and carding software. CLICK HERE TO VISIT OUR SHOP
Buy Socks 5, Email Leads, Buy Latest CC to Bitcoin Cashout Guide, Buy Hacked Zelle transfer , Western Union Money Transfer Hack, Buy Hacked Money Transfer service to your bank account.
Enroll for Paid private Carding Class.

 

Admin

The enigmatic hacking blogger who unravels the digital mysteries through his captivating blog. With relentless curiosity and a nimble touch on the keyboard, I explore the intricate web of cyberspace, exposing vulnerabilities and advocating for responsible digital citizenship. My poetic and insightful articles paint vivid pictures of the ethical dilemmas surrounding privacy, encryption, and the convergence of technology and humanity. Join me on an exhilarating journey through the labyrinth of hacking and cybersecurity as he empowers readers to become guardians of their online identities.

Leave a Reply