When you click the WiFi icon at the bottom right of your screen, you see different WiFi networks but the problem is you can not connect to them because they are mostly password protected.
So the question is, even if they are password protected, is there any way around it? Can we connect to the network without actually knowing the password?
Well, yes. There are ways to break into a network. Here is one method which was discovered few months ago. The method is quite simple.
The method/information discussed in this article is purely for educational purpose only. The author or the website will not be held responsible for any damage caused by it.
Attack On WPA/WPA2
First things first. You need to download hcxdumptool (v4.2.0 or higher) and HashCat. These tool are required to make this method operational. Simply follow the instruction on the Github page to install these tools.
Once you have installed hcxdumptool on your machine, type the following code and hit enter.
$ ./hcxdumptool -o testing.pcapng -i wlp39s0 --enable_status
Note: “testing.pcapng” is the output file of the frame. “wlp39s0” is the WiFi interface name (it can be anything).
Once the process is completed you need to convert the “testing.pcapng” file into hash format which will be accepted by Hashcat. To do so, type the following command:
$ ./hcxpcaptool -z testing.16800 testing.pcapng
After the file conversion use Hashcat to obtain the WPA PSK (Pre-Shared Key) password. You can do so by typing the following command:
$ ./hashcat -m 16800 testing.16800 -a 3 -w 3 '?l?l?l?l?l?lt!'
The process may take some time depending on password’s length and complexity. Not to worry because in most cases people try to keep the WiFi password simple and easy to remember.
Note: This method works against all 802.11i/p/q/r networks with roaming functions enabled (most modern routers).