WPA2-PSK PMKID Attack with Kali and Alfa AC1200
About
This short post goes over the workflow I use for the PMKID attack using an Alfa AC1200 (AWUS036ACH) card with a bootable Kali USB and bettercap + hcxdumptool. I have noticed more results using hcxdumptool compared to wifi.assoc all
in bettercap, but still prefer to view and log the output in bettercap, so this workflow helps make the most of both tools.
There’s plenty out there about this attack (see resources at bottom), so nothing particularly novel here.
As always, you must only execute this workflow on networks where you have permission.
Setup
Installation
- Boot into Kali.
- Connect to a network with Internet access to download packages.
- Execute
install.sh
script. - Ensure that the card is connected when prompted.
- Confirm that card is running in monitor mode with
iwconfig
.
Capturing Hashes
- Execute
capture.sh
script. - When complete, enter
wifi.show; wifi.recon off; q
in bettercap. - When script is finished, it will list all APs where PMKIDs were captured.
- Hashes will be found in the
*.pmkid.txt
files. - Session logs will be found in the
*-session_{TOOL}.log
files.
Cracking Hashes
- Use hashcat with mode 16800, e.g.
hashcat -m16800 hashes.txt wordlist.txt --show --force
.