Find password from *.cap file?

If you have a *.cap file containing the handshake, what software will you use to see the password ? Use Aircrack-ng dictionary attack. If the password dictionary list does not have a password that matches the handshake, it will not find the password. What software will you use to find the password the fastest ?

create a wordlist on your own and test it. there are tools there that can help you to do that.

as eris always says wifi hacking is always a waste of time

1 Like

To quote myself

Wifi hacking is like a candy van for kids and young adults. In the real world even mediocre measures will stop you right in your tracks most of the time.

Those youtube videos are essentially staged to work, their only function is to attract a young audience.

It’s a waste of time in MY opinion.

And to quote swiftonsecurity

I have some questions about this cap file, the software has confirmed that it has obtained the handshake, based on what characteristics ? If it has obtained the handshake, why not decode the handshake but have to use dictionary attack, Bruteforce attack or other attack… based on this cap file ? Can you answer my questions ?

Your question is not kali-related, and can be answered in detail if you look up the documentation of the protocol.

In short - it’s not transmitted in cleartext, so you can only decode it “on the fly” if you already know the key.

If you think about it for a second it should be obvious, too. You really think that a widespread wifi security measure is just waiting for kids to watch a youtube video and now they can circumvent it with ease? The thought never crossed your mind that if it WERE that easy, someone would have upped the security there?

Let me say it again:

Wifi hacking is like a candy van for kids and young adults. In the real world even mediocre measures will stop you right in your tracks most of the time.

Those youtube videos are essentially staged to work, their only function is to attract a young audience.