Capture file type | Allowed file extensions |
---|---|
Airodump | .cap |
Bettercap | .pcap |
hcxdumptool | .pcapng |
Hashcat EAPOL HCCAPX | .hccapx, .2500 |
Hashcat PMKID | .pmkid, .16800 |
Hashcat EAPOL/PMKID | .22000 |
The first three data types - *.cap
, *.pcap
, and *.pcapng
- are raw file
formats, and the rest are processed (stripped from the raw files, which include irrelevant WLAN traffic
packets).
Every capture file is essentially converted into a .22000
file because the latter file format is
generic.
There are several open-source free tools that allow you to capture handshakes in WLAN traffic. In any case, your
wireless adapter must support Monitor Mode (most laptops and external WiFi adapters support it). Follow the
tutorial
for how to capture a handshake with airodump-ng
command. And below is a list of the tools that
you can use to capture handshakes.
Tool | Description |
---|---|
Airodump | A part of aircrack-ng, the oldest and yet still used tools set. Many tutorials are based on airodump. |
Bettercap | Web user interface to capture WiFi packets and much more. |
hcxdumptool | The recommended tool. Capturing WiFi packets is as easy as hcxdumptool -o output.pcapng -i
<wlan-interface> |
wifite2 | Automates the process of capturing handshakes with aircrack-ng suite. |
Hijacker | A great tool for Android smartphones. Embeds aircrack-ng suite. |
After you capture a handshake in any of the allowed file formats specified above, navigate to the upload menu. Once you upload a handshake, several attacks are run apart from the main wordlist choice. The progress result is shown on the User Profile page.
You can find the development page on github. Please open issues for any type of questions and problems you encounter.