levisiccard Posted November 6, 2013 Share Posted November 6, 2013 (edited) Hello guys, This question is about capturing the handshake.cap file on the pineapple to have it decrypted on a later time on my Kali machine In my kali machine this would look like: # airodump-ng --bssid xx:xx:xx:xx:xx:xx -c [channel] -w handshake.cap after capturing the handshake wich will be in the .cap file I could run # aircrack-ng handshake.cap -o wordlist I think this needs no further explanation... 1st question: where will the capfile be saved on the pineapple, so I can run it on a later time on my kali machine using aircrack? 2nd question: If I find a device probing for a WPA2 AP and I run #airbase-ng --essid [the WPA2 AP] -c [channel] -W 1 -Z 2 mon0 (wich would be a twin for the real acces point) will I still be able to catch the capfile when the device tries to connect to the WPA2 rogue acces point and run it thru aircrack at a later time -> #aircrack-ng handshake.cap -o wordlist This could be done when the actual AP is not around but only a device that is probing for it. Hoping this discribes my question. So far I have no experience writing infusions but if it's possible I think it would be nice to have an infusion that - enables to easily make twins of WEP/WPA/WPA2 AP's and -capture the PSK for WEP, produce enough packets to crack WEP and crack with aircrack. I think the pineapple would be able to do so # aireplay-ng -3 -b xx:xx:xx:xx:xx:xx -h xx:xx:xx:xx:xx:xx mon0 -capture the handshake file for WPA/WPA2 to have it cracked at a later time using aircrack. I guess this would be better to do on a linux machine with a better processor then the pineapple Something to think about i guess, regards! Edited November 6, 2013 by LeeVai Quote Link to comment Share on other sites More sharing options...
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.