WiFi Password Cracking
On this page, you will learn how to perform a deauth attack with Flipper Zero to obtain a .pcap file containing the handshake (encrypted password) of a Wi-Fi network, and how to crack it.
WiFi Cracking
Let's look at the complete process of cracking a Wi-Fi password. The steps to follow are:
Have the Marauder Firmware installed
Scan the APs to find the target
Select the target AP ID
Select Sniff > Raw
Execute deauth attack
Download the .pcap file from qFlipper
Clean the .pcap file with Wireshark, filtering by
eapolSave new pcap file using only the handshake
Crack the .pcap with aircrack-ng or hashcat
1. Scan APs
Once we have Marauder installed, we can scan networks as follows:
Let's go
GPIO > ESP > Wifi Marauder

We selected
Scan ap
We can switch apto stationscanning for devices connected to networks.

We click it and it starts scanning all nearby Wi-Fi networks. This will help us identify the target network.

2. See list of APs
If we go to that section Listand select it, apwe see a detailed list of the available access points, each with an associated number. This number will be used to configure the deauth attack.


In our case, the target will be the network INHACKEABLE with the [missing information ID 1]. You can configure a vulnerable Wi-Fi network to follow these sections from your router settings.
3. Select the target AP
We press Select > apand enter the target network ID, in our case the 1, which corresponds to the network INHACKEABLE.


4. Enable Sniff Raw
In that section, Sniffwe selected the option raw. This will allow us to collect all the raw information about the Wi-Fi attacks.

5. Deauth Attack
Once all the previous steps are configured, select the option Attack > deauth, which will disconnect all devices from the target network. This is used to capture the handshake, which is the password for the encrypted Wi-Fi network.


Once the deauth attack starts (as soon as a device disconnects), we quickly go back and click on the option Sniff > rawwe had already configured to generate the .pcap file in the following path:

This file contains a lot of raw data, so we need to "clean" it to leave only the handshake and be able to crack it easily (if it has a weak password).
6. Clean the pcap with Wireshark
We're going to clean the .pcap file using Wireshark. To do this, we need to import the pcap file into Wireshark, filtering by [specific filter eapol]. We can do this by dragging the file into the interface or by opening it from File:

Applying the filter eapolwill show 4 messages. These are the 4 parts of the code 4 Way Handshake, used in modern networks to encrypt the password in plaintext.
Important : The pcap file must contain all four messages, as these are the components of the handshake. If you don't get it on the first try, you must repeat the process until you have all the components, or the cracking will not work. These components are generated when the device connected to the network disconnects and reconnects automatically.
Once filtered, we click on it File > Save asand give it the name we want, like handshake.pcap.
7. Handshake cracking with Aircrack-ng
The simplest way to crack a handshake is by using Aircrack-ng on Kali Linux, although we could also use hashcat.
For this example, we could create a file containing the network password. We could also use different dictionaries such as SecList , the Rockyou dictionary, or create our own dictionary with crunch, for example.
Using Rockyou
We must decompress the Rockyou dictionary before using it with the command:
Then we used aircrack-ng to start the cracking process
The cracking works correctly and we obtain the password in plain text:Passw0rd123
8. Cracking with Hashcat
The advantage of using this method is that we can use the full power of the GPU to crack a handshake. To crack .pcap files with hashcat, we must convert them to a format that hashcat supports. We can do this using the following tool provided by hashcat itself:
Once converted, it will generate a file with the extension .hc22000. We can easily crack this file using the following method -m 22000:
Explanation of the Parameters
-m 22000→ Specifies that the hash is of the typeWPA-PMKID+EAPOL.-d 1→ Use the GPU with the index1. Checkhashcat -Iif this is correct for your system.--status→ Shows the progress of the attack in real time.handshake.hc22000→ File converted to Hashcat format from a.capusinghcxpcapngtool.Dictionary → Defines the list of passwords to test
Last updated