Forum Thread: How to decrypt .CAP file of handshake during WiFi attack

I'm new to Linux, and recently tried WiFi hacking with the built-in tool in kali Linux i.e Wifite. I managed to capture handshake file. But the application couldn't crack the password with the help of brute force. Is there any other way I can decrypt the password from the .CAP file generated???

Please help...

Join the Next Reality AR Community

Get the latest in AR — delivered straight to your inbox.

2 Responses

Its very easy grab a good wordlist from github and run aircrack-ng with that wordlist if your machine is not very powerfull enough for bruteforce you can use some free online hash cracking services it provides hash cracking with top used 20million password list for free.

Use airgeddon.. offline wpa crack feature. It has aircrack-ng and hashcat

Share Your Thoughts

  • Hot
  • Active