Results 1 to 2 of 2

Thread: Using Crackstation.Net for a WPA2 Handshake File

  1. #1
    Join Date
    2015-Jan
    Posts
    4

    Using Crackstation.Net for a WPA2 Handshake File

    I have a wpa2 handshake file that I obtained from my lab environment using the latest version of Fluxion. I do not have any rainbow tables or word lists on my Raspberry Pi 3 for obvious reasons with storage space.

    I came across a website today called https://crackstation.net/ and it looks promising. However, from what I have read online, and if I understand what I read correctly, I need to find the hash of the .cap file. Is that correct? This particular website has the abilty to handle up to 20 different hashes.

    Then I was doing some further reading on https://null-byte.wonderhowto.com/ho...a-gpu-0170474/and I read about converting the .cap file to a .hccap file so Hashcat can crack the key. It appears I need the BSSID and the .cap file to come up with a hash. Is it that hash that I can then upload to the crackstation.net website?

    Has anyone ever used that page for the purpose of cracking a wifi password?

  2. #2
    Join Date
    2016-Dec
    Posts
    806
    You got the right way getting the hash but you need to keep searching to understand the words. BSSID is the mac address of the AP and it is written in each packet between station and AP during the 4-way handshake.

Similar Threads

  1. Where're the goods in this WPA2 handshake?
    By aptpupil in forum General Archive
    Replies: 3
    Last Post: 2017-05-30, 10:37

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •