This repository contains a Python script for cracking a WPA passphrase using a captured handshake. The script uses a wordlist to attempt different passphrases and checks if the calculated MIC (Message Integrity Code) matches the captured MIC. This tool is intended for educational and security research purposes only.
- Crack WPA passphrases using a captured handshake.
- Utilize a wordlist to perform passphrase guessing.
- Verify passphrase correctness based on MIC comparison.
- Python 3.x
- PyShark for packet analysis.
- Capture a WPA handshake using a tool like Wireshark or aircrack-ng.
- Save the capture as a
.capfile. - Place the capture file in the same directory as the script.
- Create a text file containing a list of potential passphrases (one per line) and name it
passphrases.txt. - Run the script with Python:
python script.py. - The script will iterate through the wordlist and attempt to crack the passphrase.
$ python script.py
Passphrase found: correct_passphrase
End of wordlist.