Cracking WPA/WPA2 hashes
Handshake .cap
To crack WPA/WPA2 handshakes from a .cap file using Hashcat, you can use the following command:
For this, you need to convert the .cap file to the .hccapx format first, which can be done using tools like cap2hccapx
.
For John the Ripper, the command would look like:
John the Ripper also requires the handshake to be in a specific format, often a converted .hccapx or directly in John's own 'netntlm' format.
PMKID hash
To crack a PMKID hash, you can use the following command for Hashcat:
Here, -m 16800
specifies the hash type for PMKID, pmkid_hash.txt
is the file containing the captured PMKID hash, and wordlist.txt
is your wordlist.
For John the Ripper, you'd first convert the PMKID hash into a format John can understand using hcxpcaptool
or a similar conversion utility. Then, you can crack it using:
Here, --format=wpapsk
specifies the hash type, and pmkid_john_hash.txt
would be the John-readable hash.
Last updated