Key dictionaries to audit WiFi networks with WPA and WPA2

Currently most wi-fi WiFi networks use WPA / WPA2-Personal authentication, because of this now we have a passcode of between 8 and 63 characters that’s pre-shared with all wi-fi shoppers that need to join. This kind of WiFi networks might be audited simply and rapidly by a number of strategies, the very first thing we should examine is that if the WPS is enabled and strive to crack it, then we may perform a brute drive assault to take a look at all of the mixtures, or additionally we will assault WiFi networks by dictionary. If you’re going to assault a WiFi community by dictionary, our suggestion is that you simply obtain completely different dictionaries of phrases that exist on the Internet. Today in RedesZone we’re going to present you the way to obtain the very best key dictionaries.

What is a dictionary assault?

A dictionary assault on a password, both on a system or on a WiFi community, consists of take a look at all of the phrases which are contained in a textual content file. Generally we will discover dictionaries of tens of millions of phrases that occupy a number of tens of GB in measurement, the pc may have to strive every of those phrases or mixture of phrases one after the other, till we discover the proper password or till the dictionary that we’re completed is completed. now we have downloaded. Having dictionary of keys is crucial to have the opportunity to “hit” the password, it is vitally necessary that it has tens of millions of phrases and additionally mixtures of the most typical {that a} human may put as a password.

When we obtain a dictionary of keys, if we would like to crack WiFi wi-fi networks, we should guarantee that now we have no phrases or mixture of phrases and numbers beneath Eight characters neither is it over 63 characters. We should keep in mind that WiFi networks with WPA have between 8 and 63 characters, so “making an attempt” these phrases doesn’t make any sense, since we won’t be able to “hit” the WiFi password.

Currently there are very highly effective and configurable packages that enable us to create a dictionary on demand, resembling Crunch. If we all know or intuit that the WPA password of a goal has, for instance, 10 characters and that it solely makes use of uppercase and lowercase letters, we will create a dictionary that has all of the mixtures and permutations of uppercase and lowercase letters. This manner, we cannot have to use dictionaries which are outdoors of those parameters. Crunch will enable us to configure the dictionary as we would like, and it is going to export it to a textual content file for later use in packages resembling Aircrack-ng amongst others. We should keep in mind that this instrument generates a dictionary with all of the characters, usually an individual places a simple to keep in mind WiFi password, and not a password that’s virtually random, so resorting to phrase dictionaries is a superb determination.

Key Dictionary for WPA and WPA2

We presently have numerous repositories on GitHub with textual content recordsdata with numerous passwords that we will take a look at. Of course, within the some dictionaries that we’re going to put, we will discover passwords that aren’t legitimate for WiFi networks as a result of they’re keys of lower than Eight characters or greater than 63 characters, nonetheless, we will use it with out issues as a result of the completely different packages to crack the WPA keys.


In the GitHub repository Probable-Wordlists , we’ll discover an ideal record of password dictionaries which are particularly oriented to wi-fi WiFi networks. The writer has taken dictionaries from different GitHub tasks and has leaked all passwords that might not be legitimate for wi-fi WiFi networks. Therefore, we will make sure that all of the keys that we take a look at from this dictionary will work completely. We can obtain this dictionary of keys by GitHub itself or use the .torrent file to obtain it by way of P2P as a result of it is going to certainly work sooner for you. The measurement of this dictionary is 8GB as a result of it has tens of millions of passwords filtered through the years, however they’re tailored to WiFi networks.

If we entry the GitHub repository In full, we will discover a big record of generalist key dictionaries, they don’t seem to be particularly oriented to wi-fi WiFi networks, subsequently, though we will use it, not all of the keys we take a look at shall be legitimate.


CrackStation is a free on-line platform that may enable us to crack password hashes primarily based on dictionaries that they’ve. In the occasion that we would like to obtain the password dictionaries that they’ve on their platform, we will accomplish that directly from here. The largest dictionary has a complete of 1,493,677,782 phrases and occupies 15GB of house, we will obtain it from the online or use the BitTorrent community that may go a lot sooner.

Another dictionary that now we have out there is a “small” model of the earlier one, primarily based on completely different leaks which have occurred through the years. In this record now we have a complete of 64 million passwords within the record and it occupies about 300MB uncompressed, subsequently, we may even have numerous phrases and keys to take a look at when cracking a WPA key.

SecLists and Weakpass

At GitHub SecLists repository We may even discover numerous password dictionaries, nonetheless, on this case they don’t seem to be tailored to WiFi wi-fi networks with WPA, subsequently, you would take a look at passwords that might by no means actually be later. However, this repository is well-known and extensively utilized by safety researchers.

In the WeakPass official website We can discover numerous key dictionaries which are designed for various makes use of, on this web site we will discover a considerable amount of data: measurement of the uncompressed dictionary, compressed measurement that we’re going to obtain, the approximate time of cracking utilizing completely different password hashes and additionally from WPA. For instance, the biggest dictionary will take us about 2 hours to take a look at all passwords. All dictionaries might be downloaded by direct obtain or by the BitTorrent community. This web site is extremely beneficial as a result of it has many passwords for various leaks which have occurred over time.

Use these dictionaries with Aircrack-ng

The Aircrack-ng program is the most well-liked WiFi auditing instrument that we will discover at this time, alongside with hashcat to use the facility of the GPU to carry out a brute drive assault. In order to crack a WiFi community with WPA we want to do a complete of three steps. The first step is to put our wiFi card in monitor mode and begin capturing all the information to seize the handshake:

airodump-ng -c CANAL --bssid BSSID -w psk INTERFAZ

In case now we have wi-fi shoppers related to the AP or WiFi router, we may launch a deauthentication assault to pace up the handshake seize course of, to do that we will execute the next command:

aireplay-ng -Zero 1 -a BSSID_AP -c MAC_CLIENTE INTERFAZ

Once the handshake is captured, and assuming that now we have already downloaded the dictionary, we will use it with the next command:

aircrack-ng –b BSSID –w keys.txt captura-01.cap

The identify of the airodump-ng seize is “capture-01”, the password dictionary is “keys.txt”, and the BSSID is the identify of the WiFi community that we would like to crack, because the Airodump seize captures all of the handshakes that happen.

As you might have seen, thanks to these password dictionaries for WPA and WPA2, we shall be in a position to take a look at all these passwords to see if we “get it proper” with the password of the WiFi router or AP.