Cracking WPA & WPA2 Key Using Aircrack-ng On Kali Linux




What do you think about this video?

amit rai: when I type the command airmon-ng the chipset info is not seen what can I do

Rohit sharma: teri maa ki chutt

LOL TROLL: ls: cannot access '/sys/class/ieee80211/': No such file or directory

help?

★ ilivill ★: 1:21 freak Yeah!! :D ThatBeat! should be built into Aircrack-ng.

RusselMan: Where did you download the wordlist.txt?

Mike Pence: Thank you!

sSoul_17: can I do this using only a wifi dongle? I do not have a wifi card actually inside my computer.

Gia Bảo: Open ex.cap open wlan0mon Can't open file or directory, it happened when i using this line of code aircrack-ng -b ..... ex.cap wlan0mon (The .cap location was typed correctly)

INFORMATICS TECHNOLOGY: openning dictionary wordlist.txt failed nosuch file or directory

Dhanush raj: it is not working

Jari Sipilainen: dont think its this easy and fast. to get it this fast you need have worldlist included only correct password. so you only know it. hacking is useless lol

Léo Oèl: at 01:06 nothing is showed for me, There is no infos about the network :( anyone ?

voltrox: my laptop can only do 170 keys per second is there any way I can make it go faster

bradleyrules09: how long does this part usually take ? @ 0:35 mine keeps scanning forever.. and can't write?

eralcc: Why doing deauth if you already have the handshake?

Hari Krishna Reddy: can i do the same thing in ubuntu ??

Jose Nieto: after i use airodump-ng wlan0 i have 14 minutes waiting and don't show nothing, what happend?

Echos Beck: he already had the handshake when he did aireplay-ng thats why the .cap file had 01 in front of it, he got the handshake twice, he shows that too or she

Echos Beck: @TomyToka, sorry it wouldnt let me reply or tag
someone has to connect to the wifi while your running airodump-ng.. if you cant make them join or disconnect then youll need to kick them off, with a deauth using aireplay-ng or something similar...EXAMPLE of that would be..

aireplay-ng --deauth 15 wlan1mon -a A0:A3:E2:66:40:B5 -c 3C:BB:FD:0A:53:0E
-a stands for the bssid , and the -c the mac adress of connected clients..

after you run this a few times to the connected devices, then youll get the handshake, this guy just probably took his cell phone and connected to the wifi and then diconnected and reconnected to capture the handshake, hope this helps. good luck

Tomy Toka: i can't make the handshake anyone know why?

Schools: Learn how to get phlebotomy training in California! The job pays decent money for the amount of schools needed to graduate.
Rating:
Cracking WPA & WPA2 key using Aircrack-ng on Kali Linux 5 out of 5

Shared by Others

Cracking WPA & WPA2 key using Reaver tool on Kali Linux (No Dictionary - Wordlist)
Cracking WPA & WPA2 key using Reaver tool on Kali Linux (No Dictionary - Wordlist)
How to Hack WPA/WPA2 Wi-Fi With Kali Linux Aircrack-ng
How to Hack WPA/WPA2 Wi-Fi With Kali Linux Aircrack-ng
[ANDROID] Crack WEP/WPA/WPA2 with aircrack-ng !!
[ANDROID] Crack WEP/WPA/WPA2 with aircrack-ng !!
Cracking WPA & WPA2 with Aircrack-ng..
Cracking WPA & WPA2 with Aircrack-ng..
Hacking WPA / WPA2 in Backtrack 5 R3 [HD + Narration]
Hacking WPA / WPA2 in Backtrack 5 R3 [HD + Narration]

Featured Video

How to Make Money Online


Cracking WPA & WPA2 key using Aircrack-ng on Kali Linux