0% found this document useful (0 votes)
210 views3 pages

Capturing WPA2-PSK Handshake Kali Linux 2018.4 - Online-iT

The document describes steps taken to capture a handshakes hacker in a controlled environment using a virtual machine and hashcat cracking software: 1) The hacker's captured laptop bag was placed in monitored mode to intercept traffic and have the captured hashes in a file. 2) A new terminal window and virtual machine were launched to record the traffic from a specific access point, copy the UUEN and channel number from the file, and enable monitoring mode. 3) Hashcat cracking software was used to crack the captured hashes offline by converting the hash file to hashcat format, setting the correct hash type, and running a brute force attack to reveal the wifi password and handshake details.

Uploaded by

ngan nguyen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
210 views3 pages

Capturing WPA2-PSK Handshake Kali Linux 2018.4 - Online-iT

The document describes steps taken to capture a handshakes hacker in a controlled environment using a virtual machine and hashcat cracking software: 1) The hacker's captured laptop bag was placed in monitored mode to intercept traffic and have the captured hashes in a file. 2) A new terminal window and virtual machine were launched to record the traffic from a specific access point, copy the UUEN and channel number from the file, and enable monitoring mode. 3) Hashcat cracking software was used to crack the captured hashes offline by converting the hash file to hashcat format, setting the correct hash type, and running a brute force attack to reveal the wifi password and handshake details.

Uploaded by

ngan nguyen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

012324105 678

7  4 6     ! 410"#3  $

()*+,-.,/0123*,4506)57,458*,90,1,(:++57)*8,;6<6,=178,
0#0# >  ? 8 & 
EFGHIJKLHMNJO
PHHQRSTUTVWXYZ[\EFGHIJKLHMNJO
UHIIIIIIIIMHIKJP]U]EEI]VQ]MEJHME^
I
KUTM_IIIII`aaaIb_c^ddIIaXX`eZHNNfTMWI
IIIIIIIIIIgHG]ZgTMTO]GIIhLL]EEIiHJMQZIjHQkhEEHLJTQ]GIIIlVki
IIIIIIIIIIm]QPWIEnHPQIIUHMOIUJoJQZcIIImlXIQnPZHNNIIIpPTOo]M
IIIIIIIIIIaMLPWqQJHMIr]WZHNN
IIIIIIIIIIiHK]PIgTMTO]o]MQZHNN
IIIIIIIIIII
]Qn_IIIIIIMHIKJP]U]EEI]VQ]MEJHME^
I
PHHQRSTUTVWXYZ[\I

0#4 @ A B77 B7


EFGHITJPoHMkMOIEQTPQIKUTM_
PHHQRSTUTVWXYZ[\EFGHITJPoHMkMOIEQTPQIKUTM_
I
pHFMGIsIqPHL]EE]EIQnTQILHFUGILTFE]IQPHFtU]^
uJUUIQn]oIFEJMOIvTJPoHMkMOILn]LrIrJUUvIt]NHP]IqFQQJMO
Qn]ILTPGIJMIoHMJQHPIoHG]wIQn]WIKJUUIJMQ]PN]P]ItWILnTMOJMOIL
TMGIEHo]QJo]EIqFQQJMOIQn]IJMQ]PNTL]ItTLrIJMIoTMTO]GIoHG]
I
IIIi`eIjTo]
IIIxdcIj]QKHPrgTMTO]P
IIIxYdIGnLUJ]MQ
IIdy_sIKqTzEFqqUJLTMQ
I
i{|I`MQ]PNTL]IIIePJ}]PIIIIII~nJqE]Q
I
qnW_IIIIKUTM_IIIIIIIPQcb__FEtIIImTUJMrIl]LnMHUHOWwI~HPq^Iml
I
IIIIIIIIoTLb_cddIoHMJQHPIoHG]I}JNI]MTtU]GINHPI€qnW_KUTM_I
IIIIIIIIoTLb_cddIEQTQJHMIoHG]I}JNIGJETtU]GINHPI€qnW_KUTM_
I
PHHQRSTUTVWXYZ[\I

0#' >  ?  8 &  C  D & &  8 1B7
EFGHIJKLHMNJO
PHHQRSTUTVWXYZ[\IEFGHIJKLHMNJO
UHIIIIIIIIMHIKJP]U]EEI]VQ]MEJHME^
I
KUTM_oHMII`aaaIb_c^ddIIgHG]ZgHMJQHPIIpP]‚F]MLWZc^yƒ„IS{…IIl
 %227#2 !410"3& 8 4   2 02'
012324105 678
7  4 6     ! 410"#3  $

PPPPPPPPPPQRSTUPVWXTSPPYXZ[PY\]\S^_PPPQ`aPSWT^XbbPPPcTd[]RZ
PPPPPPPPPPeXfRTPgdZd[R]RZS^Xbb
PPPPPPPPPPP
RSWhPPPPPPZXPf\TRYRVVPRiSRZV\XZVj
P
TXXSkldYdiUam^noP

()*+,,-.,/0*,1234567+,84,9:+)63*,;:<=*)0
4#0#   >>  ?@  >&
VpqXPd\TXqp]rsZ[PfYdZh]XZ
A  &7BB  ?78 7 >>  ?@  >&   C  &  &  7 >
VpqXPd\TXqp]rsZ[PfYdZh]XZPssfT\SRP]Utb\YR
4#0#?    8  &7  & D  > 8 &7   ?    & 

()*+,E.,9:+)63*,8F*,G;1-H;(I,J:K50F:=*
'#0 A 7B  7 &7   >>& >7B  &>& && 7D &7 @  LMN   &  B? >7B
 >   8 &      
VpqXPd\TXqp]rsZ[PfYdZh]XZPssuVV\qPch^mc^vh^ww^xv^yzPs{PxPss

'#4# $  8 B  878   &    & 8   @
VpqXPd\TRrYdUsZ[PssqRdpSWPhPsdPch^mc^vh^ww^xv^yzPfYdZh]XZ
'#4#? O7 ? & 7 B  0D 7  &  8 @7 &   8   
v|PPxP}~PYdrVRq^P_P]\ZVP}~P_h€zs€_shxP_h^_xP}~PewPWdZqVWd
PPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP
Pyaa‚ƒPPPPPPPPPPPPPPeQPQ„…PPyRd{XZVPPPPoƒdSd†Po‡VPPv|PPgyP
PPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP
Pch^mc^vh^ww^xv^yzPPsˆmPP‰hPPPPPPzmmPPPPPP€Š‰PPPPhPPPxPP€mˆ
PPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP
Pyaa‚ƒPPPPPPPPPPPPPPa`w`‚‹ŒPPPPPPPPPPPPeQPPPQdSRPPPPXVSPP
PPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP
Pch^mc^vh^ww^xv^yzPPc‰^yc^zh^vŠ^v^ˆxPPsŽ€PPPP€RsP€RPPPPPhP
P
vTXXSkldYdiUam^noP

'#4#& 7     &  B  4

 %227#2 !410"3& 8 4   2 42'


012324105 678
7  4 6     ! 410"#3  $

'#'# 7()  &     8 & &


HIJKLMNOPOMPQRSTLUVHUWXYPMZ
OKKU[\M]M^_`abcdLHIJKLMNOPOMPQRSTLUVHUWXYPMZ
eZVSNSTLUVHUWXYPMZHVLfMNUYYY
gVMJLhiXhWLZMPQVUHY
L
LLLdLLj``klLLLLLLLLLLLLLLm``klLLLLLLLLLLLLLLLLLLLLLmSPO_ZUN
L
LLLXLLnWbanboWbppbqobjhLLrVsMsLLLLLLLLLLLLLLLLLLLLtupLvXLrM
L
orKKHNSTLwNOHULSVUfKOQLMHLUMOTVUY
L
eZVSNSTLUVHUWXYPMZHVLfMNUYYY
gVMJLhiXhWLZMPQVUHY
L
XLZKUVSUNM]LUMOTVUH
L
u]VMHVLHZVPNw_LMLJNPUNKSMO_LvKZUNKSLRfxY
L
L
yINUUNSTLMNOPOMPQRSTYYY
OKKU[\M]M^_`abcdLL

*+,-./0.1234,5+.67,.18-+95,:.18-.;<=,
3#0
 &  #& (  7 > 7 && ! (7)  7 > & &?   &   )  @ &   8
A7 &   7   &7@  2 4 & &  ( 7  &  &  (#
$  7++-B0CC78B7D8+E3,+CD8-F7DD8-GC   7   (#
  ( 78   7 78 7 & &  (7)  (   &   878#

 %227#2 !410"3& 8 4   2 '2'

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy