githubEdit

WiFi Password Cracking

On this page, you will learn how to perform a deauth attack with Flipper Zero to obtain a .pcap file containing the handshake (encrypted password) of a Wi-Fi network, and how to crack it.

WiFi Cracking

Let's look at the complete process of cracking a Wi-Fi password. The steps to follow are:

  1. Have the Marauder Firmware installed

  2. Scan the APs to find the target

  3. Select the target AP ID

  4. Select Sniff > Raw

  5. Execute deauth attack

  6. Download the .pcap file from qFlipper

  7. Clean the .pcap file with Wireshark, filtering byeapol

  8. Save new pcap file using only the handshake

  9. Crack the .pcap with aircrack-ng or hashcat

1. Scan APs

Once we have Marauder installed, we can scan networks as follows:

  1. Let's goGPIO > ESP > Wifi Marauder

  1. We selectedScan ap

We can switch apto stationscanning for devices connected to networks.

  1. We click it and it starts scanning all nearby Wi-Fi networks. This will help us identify the target network.

2. See list of APs

If we go to that section Listand select it, apwe see a detailed list of the available access points, each with an associated number. This number will be used to configure the deauth attack.

In our case, the target will be the network INHACKEABLE with the [missing information ID 1]. You can configure a vulnerable Wi-Fi network to follow these sections from your router settings.

3. Select the target AP

We press Select > apand enter the target network ID, in our case the 1, which corresponds to the network INHACKEABLE.

4. Enable Sniff Raw

In that section, Sniffwe selected the option raw. This will allow us to collect all the raw information about the Wi-Fi attacks.

5. Deauth Attack

Once all the previous steps are configured, select the option Attack > deauth, which will disconnect all devices from the target network. This is used to capture the handshake, which is the password for the encrypted Wi-Fi network.

Once the deauth attack starts (as soon as a device disconnects), we quickly go back and click on the option Sniff > rawwe had already configured to generate the .pcap file in the following path:

This file contains a lot of raw data, so we need to "clean" it to leave only the handshake and be able to crack it easily (if it has a weak password).

6. Clean the pcap with Wireshark

We're going to clean the .pcap file using Wireshark. To do this, we need to import the pcap file into Wireshark, filtering by [specific filter eapol]. We can do this by dragging the file into the interface or by opening it from File:

Applying the filter eapolwill show 4 messages. These are the 4 parts of the code 4 Way Handshake, used in modern networks to encrypt the password in plaintext.

Important : The pcap file must contain all four messages, as these are the components of the handshake. If you don't get it on the first try, you must repeat the process until you have all the components, or the cracking will not work. These components are generated when the device connected to the network disconnects and reconnects automatically.

Once filtered, we click on it File > Save asand give it the name we want, like handshake.pcap.

7. Handshake cracking with Aircrack-ng

The simplest way to crack a handshake is by using Aircrack-ng on Kali Linux, although we could also use hashcat.

For this example, we could create a file containing the network password. We could also use different dictionaries such as SecListarrow-up-right , the Rockyou dictionary, or create our own dictionary with crunch, for example.

Using Rockyou

We must decompress the Rockyou dictionary before using it with the command:

Then we used aircrack-ng to start the cracking process

The cracking works correctly and we obtain the password in plain text:Passw0rd123

8. Cracking with Hashcat

The advantage of using this method is that we can use the full power of the GPU to crack a handshake. To crack .pcap files with hashcat, we must convert them to a format that hashcat supports. We can do this using the following tool provided by hashcat itself:

Once converted, it will generate a file with the extension .hc22000. We can easily crack this file using the following method -m 22000:

Explanation of the Parameters

  • -m 22000→ Specifies that the hash is of the typeWPA-PMKID+EAPOL.

  • -d 1→ Use the GPU with the index 1. Check hashcat -Iif this is correct for your system.

  • --status→ Shows the progress of the attack in real time.

  • handshake.hc22000→ File converted to Hashcat format from a .capusing hcxpcapngtool.

  • Dictionary → Defines the list of passwords to test

Last updated