

With the speed of 4212 keys per seconds, it would take more than one and 1/2 year to find the key. Let's say that our passphrase consists of lower-case letters (, 26 characters total) and the total passphrase length is 8 letters. Picture 1 - Checking WPA Cracking Speed Performed by CPU

Our WPA cracking speed is 4212 keys per seconds with the CPU Intel I7(TM)-4600U (Picture 1). Finally, we found the passphrase 'submarine' which is listed in a well-known dictionary - rockyyou.txt.Ĭracking the passphrase with aircarck-ng is performed entirely by CPU. As a final step, we performed dictionary attack with aircrack-ng command to find a passphrase. More specifically, we accelerated the process of generating handshake messages using aireplay-ng tool and captured the handshake using airodump-ng. In the previous tutorial, we installed the aircrack-ng suite to capture and crack the 4-way authentication handshake to obtain passphrase needed to access a wireless network. These keys are then used to encrypt data sent over wireless medium. The WPA/WPA2 4-way authentication handshake between AP (authenticator) and client (supplicant) is used to generate encryption keys.
