- Contact
- Introduction
- Step 1: Download and Install Parrot OS
- Step 2: Setting Up Parrot OS
- Step 3: Capturing the WiFi Network Handshake
- Step 4: Converting the Handshake File Offline
- Step 5: Decrypting the Handshake with Hashcat
- Additional Resources
- Conclusion
Wireless networks secured with WPA/WPA2 encryption are generally safe, but understanding how to test and ensure their security can be a valuable skill. This guide will walk you through the process of using Parrot OS and various tools to capture and decrypt WiFi network handshakes.
- Download Parrot OS Linux Distro: Start by downloading the Parrot OS from Parrot Security.
- Download Balena Etcher: To create a bootable USB flash drive, download Balena Etcher from Balena Etcher.
- Burn the Image: Use Balena Etcher to burn the Parrot OS image to your USB flash drive.
- Boot from USB: Insert the USB flash drive into your computer and boot from it.
- After booting into Parrot OS, click on "Applications" in the top left corner.
- Navigate to Pentesting -> Wifi Pentesting -> Airgeddon.
A handshake in WiFi terms is a process where a device connects to a network and exchanges keys to establish a secure connection. This exchange can be captured and used to attempt decryption of the network password.
- Select Your WiFi Card: In Airgeddon, first select your WiFi card.
- Enable Monitor Mode: Choose option 2 to set your WiFi card into monitor mode, which allows it to capture all traffic on the network.
- Navigate to Handshake/PMKID Tools: Select option 5.
- Explore WiFi Networks: Choose option 4 to scan for nearby WiFi networks.
- A window will pop up displaying available networks.
- Stop the scan by pressing
Ctrl + C
.
- Select Desired Network: Choose the network you want to test.
- Capture Handshake: Select option 6.
- You will be given three methods to attack and capture the handshake:
- Deauthentication attack to disconnect a client and force a reconnect.
- PMKID capture for WPA3 and WPA2 networks.
- Passive capture waiting for a client to connect.
- After a successful attack, you will obtain a
.cap
file containing the handshake.
- You will be given three methods to attack and capture the handshake:
Instead of using an online tool, you can convert the .cap
file to the .hc22000
format offline using tools available in Parrot OS.
- Convert .cap to .hc22000 offline: Use
hcxpcapngtool
fromhcxtools
to convert the.cap
file:hcxpcapngtool -o output.hc22000 input.cap
- Replace
output.hc22000
with your desired output file name. - Replace
input.cap
with the name of your captured handshake file.
- Replace
-
Open a New Bash Shell: In Parrot OS, open a terminal.
-
Run Hashcat: Use the following command to start decrypting the
.hc22000
file:hashcat -m 22000 <your_.hc22000_file> <wordlist>
- Replace
<your_.hc22000_file>
with the path to your converted handshake file. - Replace
<wordlist>
with the path to your wordlist file. Parrot OS includes wordlists in/usr/share/wordlists
.
For example:
hashcat -m 22000 handshake.hc22000 /usr/share/wordlists/rockyou.txt
- Replace
For more options and detailed usage of Hashcat, refer to the help command:
hashcat --help
By following these steps, you can capture and attempt to decrypt WPA/WPA2 handshakes, allowing you to test the security of your own WiFi networks. Always ensure you have permission to test any network you do not own. This process is strictly for educational and security testing purposes.