This guide is for educational purposes only. Unauthorized access to computer networks is illegal and punishable by law. Always obtain explicit permission before testing any network.
This tutorial provides a step-by-step guide on how to crack Wi-Fi passwords using the Airgeddon tool, which leverages vulnerabilities in WPA/WPA2 encryption. The process involves capturing WPA/WPA2 handshakes and then using them to crack the password.
Important: Perform these actions only on networks you own or have explicit permission to test. Unauthorized access to networks is illegal and unethical.
-
Hardware:
- Wireless Network Adapter with monitor mode and packet injection support (e.g., TP-Link adapter with Atheros chipset).
-
Software:
- Parrot Security OS (or another Linux distribution for penetration testing).
- VirtualBox (for running Parrot Security OS in a virtual environment).
- Airgeddon (included in Parrot Security OS).
-
Resources:
- Password dictionaries (e.g., RockYou password list).
- Download Parrot Security OS or the lighter version, Parrot Air.
- Install VirtualBox from Oracle.
- Create a new virtual machine in VirtualBox and use the downloaded Parrot Security OS image to install it.
- Connect your wireless adapter to your computer.
- In VirtualBox, go to
Devices>USBand select your wireless adapter to ensure it's available in the virtual machine.
-
Boot Parrot Security OS in VirtualBox.
-
Start Airgeddon:
-
Open a terminal and launch Airgeddon:
sudo airgeddon
-
-
Put Wireless Adapter into Monitor Mode:
-
In Airgeddon, select Option 2 to enable monitor mode:
[2] Enable Monitor Mode
-
This will allow you to scan for networks.
-
-
Scan for Targets:
-
Select Option 4 to explore available wireless networks:
[4] Explore Wireless Networks
-
Pay attention to the data columns, particularly those indicating active connections (e.g., downloads or streaming).
-
Let the scan run for 20-30 seconds to gather a comprehensive list of networks. Press
Ctrl+Cto stop the scan.
-
-
Select Target Network:
- Choose a network from the list that has active clients.
- Airgeddon will prompt you to select the network you want to target.
-
Capture the Handshake:
-
Move to the Handshake Tools menu by selecting Option 5:
[5] Handshake Tools
-
Select Option 1 to start capturing the handshake:
[1] Capture WPA Handshake
-
Airgeddon will send deauthentication packets to disconnect clients and force them to reconnect, capturing the handshake in the process.
-
Once the handshake is captured, Airgeddon will save it to a file. Note the filename and location.
-
-
Crack the Password:
-
Go to Option 6 to start the password cracking process:
[6] Cracking WPA Handshake
-
Airgeddon will use the saved handshake file and your selected password dictionary to attempt to crack the password.
-
You can use a pre-existing dictionary file like RockYou or create a custom one. Make sure to specify the path to your dictionary file when prompted.
-
-
Monitor Cracking Progress:
- Airgeddon will display the progress as it attempts to crack the password. This process may take seconds to minutes depending on the password's complexity.
This guide demonstrates how to use Airgeddon to capture and crack WPA/WPA2 Wi-Fi passwords. Ensure that you use these techniques responsibly and only on networks you have permission to test.
This guide is for educational purposes only. Unauthorized access to computer networks is illegal and punishable by law. Always obtain explicit permission before testing any network.

