RE: aircrack-ng is not good 06-29-2019, 12:32 PM
#17
Ok so... even if you get the handshake via deauth there is a high chance that you could not get all of the four way handshake. I would open two terminals... one running airmon-ng with the channel, the essid, and your adapter in monitor mode, but also have it write to an output. Keep this running. In the other terminal, use aireplay-ng for deauth. I suggest 10 or 15 packets should be tried. Keep trying until you see in the airmon-ng terminal that you got the handshake.The output file can be loaded in wireshark so you can examine each packet manually. Observing what is happening I have found is essential for hacking.
A little side note, cracking wifi is actually *cough* retarded now because unless the psswd is less than 8 characters or you have knowledge of the psswd (you can use hashcat to bruteforce it if you do), then it is not really worth it. The reason is that, cracking it with a wordlist is only as effective by how good your wordlist is and prior knowledge or getting the knowledge via SE. Of course you could just ask.
A little side note, cracking wifi is actually *cough* retarded now because unless the psswd is less than 8 characters or you have knowledge of the psswd (you can use hashcat to bruteforce it if you do), then it is not really worth it. The reason is that, cracking it with a wordlist is only as effective by how good your wordlist is and prior knowledge or getting the knowledge via SE. Of course you could just ask.