PDA

View Full Version : Using Crackstation.Net for a WPA2 Handshake File



Bedrock1977
2018-02-02, 05:41
I have a wpa2 handshake file that I obtained from my lab environment using the latest version of Fluxion. I do not have any rainbow tables or word lists on my Raspberry Pi 3 for obvious reasons with storage space.

I came across a website today called https://crackstation.net/ and it looks promising. However, from what I have read online, and if I understand what I read correctly, I need to find the hash of the .cap file. Is that correct? This particular website has the abilty to handle up to 20 different hashes.

Then I was doing some further reading on https://null-byte.wonderhowto.com/how-to/brute-force-wpa-wpa2-via-gpu-0170474/and I read about converting the .cap file to a .hccap file so Hashcat can crack the key. It appears I need the BSSID and the .cap file to come up with a hash. Is it that hash that I can then upload to the crackstation.net website?

Has anyone ever used that page for the purpose of cracking a wifi password?

Mister_X
2018-02-04, 01:11
You got the right way getting the hash but you need to keep searching to understand the words. BSSID is the mac address of the AP and it is written in each packet between station and AP during the 4-way handshake.