Wi-Fi Cracking

Wireshark before cracking


aircrack-ng use on first .cap file


aircrack-ng on the WEP option


Decryption using airdecap-ng


Initial decrypted Wireshark file


Wireshark of file with “arp” display filter


More ARP requests and gratuitous ARP requests


Wireshark of second .cap file


Finding a 4-way handshake in the capture


aircrack-ng command to find a WPA encryption with the handshake


aircrack-ng command with -w option to add the wordlist rockyou.txt on WPA encryption with ESSID: CCNI


Decryption


Protocol statistics


Wireshark of decrypted file

Getting MD5 hash for my Midas ID


Saving my .cap file into the VMshare folder on the virtual machine host


Moving wordlist to working directory


aircrack-ng on file to find encryption


aircrack-ng with option -w used with rockyou.txt to find KEY


airdecap-ng with options -p to input password KEY and -e for ESSID: CyberPHY