Select “Cracking WPA with Aircrack” from the main menu. Allow up to 30 seconds to initialize the network.

A single attacker window will appear in your terminal.

Run the following command in this terminal to crack the key associated with the WPA handshake collected from the bettercap lab.

aircrack-ng -w /Wifi-Forge/Framework/materials/rockyou.txt /Wifi-Forge/Framework/loot/4whs

If your capture file contains multiple networks, aircrack will find all the networks in the capture and ask which network the hash is associated with. Input the number associated with the WPA2_Network and hit enter if you are prompted.

Allow for up to 30 seconds for the password to be revealed.

You now are familiar with two different methods to collect and crack WPA2 keys. Use the main_menu command to return to the main menu and onto the next lab.

NEXT LAB: Lab 06 - Airgeddon Denial of Service Beacon Attacks