The process of initiating WPA cracking begins with configuring your network interface using the
"ifconfig" command, which helps you identify available network interfaces. If your network card is
recognized as "wlan0," the next step is to enable "monitor" mode on your wireless network card.
This mode allows you to capture packets passively without establishing a connection with any
network. It's important to note that the availability of this mode depends on your network card's
driver, and Windows supports this mode for only a limited number of network cards. You can
activate monitor mode by executing the command "sudo airmon-ng wlan0mon”.
The following step involves identifying and choosing your target network. To accomplish this, you
can use the "airodump-ng wlan0mon" command. This command scans all channels and provides a
list of accessible access points along with their associated clients within your proximity. Once you've
picked your target network, make sure to take note of its Channel and BSSID (MAC address).
Next, you'll capture traffic from the selected access point and save it into a file. To do this, use the
command "airodump-ng –bssid (MAC address of the access point) –channel (AP channel) –write
(name of the new file to store the data) wlan0mon." You can also wait for a new client to connect to
the access point, which will allow you to capture the four-way WPA handshake.
To crack the key, you'll need a word dictionary that contains common words. The aircrack-ng utility
utilizes this dictionary file to attempt various combinations of passphrases in an effort to crack the
key. If the passphrase is found in the dictionary file, the utility will eventually succeed in cracking the
key.
The WPA encryption has been successfully bypassed, and the password is "68643584".