The WPA2 Wifi Password Hack is almost the same for many years. Currently there is a new method of Wifi attack that is less complicated than traditional methods, especially being able to target access points no one is connected to. This method uses Hashcat to decrypt the -PMKID packet to unlock WPA passwords and allows hackers to find networks with weak passwords more easily.
Classic Hack Password WIFI Method
The old way of cracking WPA2 has been around for quite some time and involves disconnecting a device from the access point. This has two important disadvantages for Wi-Fi hackers.
The first drawback is that there must be a device connecting to Wifi. Wifi passwords can be weak and easy to crack, but if no devices are connected, there will be no chance to shake hands (handshake), so there is no chance to try cracking.
Hack Password WIFI Method with Hashcat
Instead of relying on blocking two-way communication between Wi-Fi devices for password cracking, hackers can communicate directly with Wi-Fi hotspots with new methods. On August 4, 2018, a post on the Hashcat forum detailed a new technique that promoted the attack against RSN IE (Robust Security Network Information Element) to capture the necessary information and implement Brute. -force.
Similar to WPA attacks, Hacker must catch Wifi waves that want to attack. The way is to use USB catch Wifi compatible The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) Linux to try brute-force passwords. Instead of using Aireplay-ng or Aircrack-ng, AnonyViet will guide you to use a new Hack Password Wifi tool called hcxtool.