
This is what the KEY FOUND! inscription tells us. So, my dictionary is located in the /home/mial/2ndHDD/newrockyou.txt file, the access point is named dlink, and the handshake file is called dlink-02.cap and is located in the current working directory, then I compose the command:Īircrack-ng -w /home/mial/2ndHDD/newrockyou.txt -e dlink dlink-02.capĪs you can see, all eight cores of the CPU are fully loaded:

-e ESSID is the name of the access point (wireless network).
#AIRCRACK WORDLISTS PASSWORD#
-w path_to_dictionary is a word list in format one password candidate per line.Although the last drawback is leveled by the fact that Aircrack-ng can be paired with other programs that support these masks, rules, and password generation on the fly.Īnother advantage of the program is that it works fine under Windows.Īircrack-ng -w path_to_dictionary -e ESSID handshake.capĪlthough the command is simple, we explain that: Another big disadvantage is the lack of support for masks, rules and other brute-force options. Disadvantage of this way it does not use a video card. If you want to brute-force WPA PSK passwords with only the power of the CPU, then Aircrack-ng is one of the suitable programs. The speed of cracking will be much higher. If you manage to configure proprietary video card drivers, then, of course, it is recommended using Hashcat to brute-force passwords. Successfully captured handshake can be hacked by various programs.
