Cracking Wireless: How to access any WPA2 wireless network

by MAC



Don’t forget to subscribe and like the video for continued Cyber Security viewing!

In this video you will understand how to break into wireless and that gaining access to a Wireless WPA2 network which uses a Pre Shared Key, isn’t too hard! Using a variety of tools to put your network adaptor into Monitor mode, then gaining a handshake to crack its hash, you’ll be well away gaining access into a wireless network.

~~~
This is an educational video, gain permission from target owners before attempting anything from this tutorial. By not doing so, you risk being penalised by the computer misuse act or equivalent in your country
~~~

Aircrack-NG: https://github.com/aircrack-ng/aircrack-ng
hashcat-utils: https://github.com/hashcat/hashcat-utils/releases/
HashCat: https://hashcat.net/hashcat/

WIRELESS ADAPTERS FOR MONITOR MODE
* Alfa AWUS036NHA
* Alfa AWUS036NH
* Alfa AWUS036ACH
* TP-Link TL-WN722N (Version 1 Only)
* Panda PAU09
* Panda PAU05
* Alfa AWUS036NEH
* Alfa AWUS051NH

Twitter: https://twitter.com/TurvSec

source

5 comments

Jordan Tangy July 31, 2020 - 12:33 pm

Hey MrTurvey !
First thank you for this well explained video.
I wanted to ask if it is possible to use hashcat on Kali Linux and why did you use it on Windows ?

Reply
s-drop July 31, 2020 - 12:33 pm

Which adaptor you use bro…

Reply
hxmo July 31, 2020 - 12:33 pm

What do you suppose are the chances of cracking a WPA2 if a company decided to stick with like the default randomly assigned password which could be like 10-15 characters and just bunch of random letters ? Is there a WPA2 dictionary out there for these scenarios or is it just a give up ?

Reply
Leo July 31, 2020 - 12:33 pm

Really liked the video, you explained everything nicely and I hope you start getting more views because you deserve them. Cheers mate!

Reply
usama sattar July 31, 2020 - 12:33 pm

Good showing but not everyone has enough GPU horsepower to crack complex passwords so instead use Evil-twin attack to get passwords quickly without having to wait longer.

Reply

Leave a Comment