Read full details here: Cracking WPA WPA2 with Hashcat on Kali Linux (BruteForce MASK based attack)
I will use cudahashcat command because I am using a NVIDIA GPU. If you’re using AMD GPU, then I guess you’ll be using oclHashcat. Let me know if this assumptions is incorrect.
To enable GPU Cracking, you need to install either CUDA for NVIDIA or AMDAPPSDK for AMD graphics cards. I’ve covered those in in my previous posts.
Hashcat allows you to use the following built-in charsets to attack a WPA/WPA2 handshake file.
What it means is that you’re trying to break a 8 digit number password like 12345678 or 23456789 or 01567891.. You get the idea.
Note: ?a represents anything …. I hope you’re getting the idea.
If you are absolutely not sure, you can just use any of the predefined MASKs file and leave it running. But yeah, come back to check in a million years for a really long password …. Using a dictionary attack might have more success in that scenario.
There will be 125 combinations in this case. But it will surely break it in time. This is the true power of using cudaHashcat or oclHashcat or Hashcat on Kali Linux to break WPA/WPA2 passwords.
You can even up your system if you know how a person combines a password. Some people always uses UPPERCASE as the first character in their passwords, few lowercase letters and finishes with numbers.
Example: Abcde123
Your mask will be:
That’s enough with MASK’s. Now let’s capture some WPA/WPA2 handshake files. Following WiFite section was taken from a previous guide Cracking Wifi WPA/WPA2 passwords using pyrit cowpatty in Kali Linux which was one of the best guides about cracking Wifi passwords out there.
Type in the following command in your Kali Linux terminal:
If you want to see everything, (
Read the rest of it here: Cracking WPA WPA2 with Hashcat on Kali Linux (BruteForce MASK based attack)
Cracking WPA WPA2 with Hashcat oclHashcat or cudaHashcat on Kali Linux (BruteForce MASK based attack on Wifi passwords)
cudaHashcat or oclHashcat or Hashcat on Kali Linux got built-in capabilities to attack and decrypt or crack WPA WPA2 handshake .cap files. Only constraint is, you need to convert a .cap file to a .hccap file format. This is rather easy.My Setup
I have a NVIDIA GTX 210 Graphics card in my machine running Kali Linux 1.0.6 and will userockyou
dictionary for most of the exercise. In this post, I will show How to
crack WPA/WPA2 handshake file (.cap files) with cudaHashcat or
oclHashcat or Hashcat on Kali Linux.I will use cudahashcat command because I am using a NVIDIA GPU. If you’re using AMD GPU, then I guess you’ll be using oclHashcat. Let me know if this assumptions is incorrect.
To enable GPU Cracking, you need to install either CUDA for NVIDIA or AMDAPPSDK for AMD graphics cards. I’ve covered those in in my previous posts.
NVIDIA Users:
- Install proprietary NVIDIA driver on Kali Linux – NVIDIA Accelerated Linux Graphics Driver
- Install NVIDIA driver kernel Module CUDA and Pyrit on Kali Linux – CUDA, Pyrit and Cpyrit-cuda
AMD Users:
- Install AMD ATI proprietary fglrx driver in Kali Linux 1.0.6
- Install AMD APP SDK in Kali Linux
- Install Pyrit in Kali Linux
- Install CAL++ in Kali Linux
Why use Hashcat to crack WPA/WPA2 handshake file?
Pyrit is the fastest when it comes to cracking WPA/WPA2 handshake files. So why are we using Hashcat to crack WPA/WPA2 handshake files?- Because we can?
- Because Hashcat allows us to use customized attacks with predefined rules and Masks.
Hashcat allows you to use the following built-in charsets to attack a WPA/WPA2 handshake file.
Built-in charsets
?l = abcdefghijklmnopqrstuvwxyz
?u = ABCDEFGHIJKLMNOPQRSTUVWXYZ
?d = 0123456789
?s = !”#$%&'()*+,-./:;⇔?@[\]^_`{|}~
?a = ?l?u?d?s
Numbered passwords
So lets say you password is 12345678. You can use a custom MASK like ?d?d?d?d?d?d?d?dWhat it means is that you’re trying to break a 8 digit number password like 12345678 or 23456789 or 01567891.. You get the idea.
Letter passwords – All uppercase
If your password is all letters in CAPS such as: ABCFEFGH or LKHJHIOP or ZBTGYHQS ..etc. then you can use the following MASK:?u?u?u?u?u?u?u?u
It will crack all 8 Letter passwords in CAPS.Letter passwords – All lowercase
If your password is all letters in lowercase such as: abcdefgh or dfghpoiu or bnmiopty..etc. then you can use the following MASK:?l?l?l?l?l?l?l?l
It will crack all 8 Letter passwords in lowercase. I hope you now know where I am getting at.Passwords – Lowercase letters and numbers
If you know your password is similar to this: a1b2c3d4 or p9o8i7u6 or n4j2k5l6 …etc. then you can use the following MASK:?l?d?l?d?l?d?l?d
Passwords – Uppercase letters and numbers
If you know your password is similar to this: A1B2C3D4 or P9O8I7U6 or N4J2K5L6 …etc. then you can use the following MASK:?u?d?u?d?u?d?u?d
Passwords – Mixed matched with uppercase, lowercase, number and special characters.
If you password is all random, then you can just use a MASK like the following:?a?a?a?a?a?a?a?a
Note: ?a represents anything …. I hope you’re getting the idea.
If you are absolutely not sure, you can just use any of the predefined MASKs file and leave it running. But yeah, come back to check in a million years for a really long password …. Using a dictionary attack might have more success in that scenario.
Passwords – when you know a few characters
If you somehow know the few characters in the password, this will make things a lot faster. For every known letter, you save immense amount of computing time. MASK’s allows you to combine this. Let’s say your 8 character password starts with abc, doesn’t contain any special characters. Then you can create a MASK rule file to contain the following:abc?l?l?l?l?l
abc?u?u?u?u?u
abc?d?d?d?d?d
abc?l?u??d??d?l
abc?d?d?l?u?l
There will be 125 combinations in this case. But it will surely break it in time. This is the true power of using cudaHashcat or oclHashcat or Hashcat on Kali Linux to break WPA/WPA2 passwords.
You can even up your system if you know how a person combines a password. Some people always uses UPPERCASE as the first character in their passwords, few lowercase letters and finishes with numbers.
Example: Abcde123
Your mask will be:
?u?l?l?l?l?d?d?d
This will make cracking significantly faster. Social engineering is the key here.That’s enough with MASK’s. Now let’s capture some WPA/WPA2 handshake files. Following WiFite section was taken from a previous guide Cracking Wifi WPA/WPA2 passwords using pyrit cowpatty in Kali Linux which was one of the best guides about cracking Wifi passwords out there.
Capture handshake with WiFite
WhyWiFite
instead of other guides that uses Aircrack-ng? Because it’s faster and we don’t have to type in commands..Type in the following command in your Kali Linux terminal:
wifite –wpa
You could also type in
wifite wpa2
If you want to see everything, (
wep
, wpa
or wpa2
, just type the following command. It doesn’t make any differences except few more minuteswifite
Once you type in following is what you’ll see.
Read the rest of it here: Cracking WPA WPA2 with Hashcat on Kali Linux (BruteForce MASK based attack)
No comments:
Post a Comment