RE: Cracking WPA-SK 11-15-2015, 10:39 PM
#8
I suggest capturing a 4-way WPA/PSK handshake (message 1 and 2 required) using airodump-ng
Then using aircrack -J convert it to Hashcat hccap and then using hashcat to crack it.
WPA(2) keys tend to take quite a while to crack and a lot of effort if you have a random password.
Then using aircrack -J convert it to Hashcat hccap and then using hashcat to crack it.
WPA(2) keys tend to take quite a while to crack and a lot of effort if you have a random password.