Of course, the use is still aircrack suite, this is still running dictionary, today, caught another lab icephone WPA handshake Package, I guess the lab wifi is usually related to their name, Icephone just 8-bit letters, So I wrote the combination icephone into a dictionary, and then called the command
Aircrack-ng-w/path/Dictionary/path/Handshake Package
(path for your route) to crack, alas, there is no password you want
I'm funny guessing that he may not be 8 bit, but the big one is probably the front is icephone, so I use the crunch Password generator tool to generate a temporary dictionary specifically for him, using the following command to generate a 9-bit password (icephone followed by a letter)
9 9 -t [email protected] >/path/temple_dic
Then run the dictionary, is still not, so I add a few, increase to 2, three, four, five bit more is very big I paused to try, it seems that the letter is not, then use the numbers, in my mind, people seem to like to use 4 bit 8 digits such numbers, So this time, just use crunch to generate a dictionary of Icephone, followed by a 4-bit.
9 9 -T icephone%%%% >/path/temple_dic
and ran the dictionary, really, ran out, and this code just guessed it.
Harvest
Sometimes, we get to the handshake package, not necessarily run out of the password, because to see whether the dictionary is strong, but sometimes, we are based on a wifi name, or WiFi host some information, we can make their own possible dictionaries, so the answer big increase crack rate.
Countermeasures
We'd better not combine WiFi with some of our hobbies, some people who are enough to penetrate the test will randomly find some people to do the manuscript experiment, and then understand your personal information, understand your personality, according to these to crack the password, so the password is best is not related to their own and strong enough.
"1" once cracked WiFi