This guide is currently under development, and I greatly welcome any suggestions or feedback or at reaper.gitbook@gmail.com

Cracking Authentication Hashes

Wi-Fi Protected Access (WPA) supports 2 authentication types:

  1. Pre-Shared Key (PSK)

  2. Enterprise


WPA, WPA2, and WPA3 all rely on hashes for keys see this for more about hashing https://www.codecademy.com/resources/blog/what-is-hashing , and because the hashes are irreversible and we can't obtain the keys back from them, we will follow the steps below:

  1. We will need to have a handshake

  2. We will try to guess the passphrase and send that guess to the used hash function

  3. We will compare the output of the hash function to the handshake

  4. If:

    1. if they match, then the passphrase is correct!

    2. if not, then we continue the guessing :(

Passphrases lengths from 8 to 63 characters, so knowing the right length will help a lot in generating wordlist


In which attacks we can do this? check the following:


We will cover several cracking tools:

  1. John-the-ripper

  2. Crunch

  3. RSMangler

  4. Hashcat

Last updated

Was this helpful?