Cracking Password WPA2 with Handshake error

Feb 16, 2018 06:05 PM

In my country, one ISP use a format for the Wifi Password, ex. wifi-xxxxxxxx, the xxxxxxxx is a numerical combination, I generated a dictionary with this format, and I used aircrack for the brute force

I was using Airgeddon for getting the .cap with the handshake, but at the end, the aircrack didn't get the password, I attacking my Wifi, and I have my real password inside of the directory.

Someone know What I'm doing wrong?

Related Articles

637263493835297420.jpg

How to Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)

636455706472146367.jpg

How to Hide DDE-Based Attacks in MS Word

Comments

No Comments Exist

Be the first, drop a comment!