How to Hack WPA/WPA2 encryption with Windows


As you know there are a lot of ways to hack WiFi password. And at one of previous posts we speak how to hack WPA/WPA2 encryption with BackTrack OS. So there are and way for Windows users too.


1. You need to download CommView and after that download Wireless Security Auditor too. And install both on computer.
2. Open CommView and click on the Start option. Click on the capture option to start the capture. It will show you all available AP. Click on the Tools > Select the Node Reassoication option ( if Node REassociation is not working , then use WiFi Alfa card ).
3. Select your target AP in the Send a deauthentication request from this AP option. It will show you all available client option.
Click on the Send Now option to send the packet for 4-way authentication. Wait some time - it will capture the packet.
4. Click on the Save option and choose your file format Commview Capture Files (*.ncf).
Capture process already done!
5. Now open Wireless Security Auditor. Click on the Import Data tab > select the Import CommViewLog option.
It will show you information about AP and Multiple Handshake selection information. Click on OK.
6. Click on the Start attack option and select the Dictionary Attack option. However, your other attack's options are also available.
Within minutes it will find your password and it will show you the password.
Now your done! I hope you enjoy it.

Related Posts:

  • ATM hacks For even more help hacking ATMs, checkout the ATM Hacks app for Android. It includes pictures and manuals of dozens of ATM models, and how to access each.: Click here to download ATM Hacks Android app. This guide will tea… Read More
  • Clearing system logs This tutorial will walk you through clearing the system logs on a win… Read More
  • Bypassing school security This tutorial will walk you through some methods for bypassing basic school security (the kind that stops you from accessing certain websites, or downloading certain files.) Bypassing the restriction to download .exe fil… Read More
  • Creating a botnet This tutorial uses mIRC and other tools, which you will need to download. You can find them via google or through pirating methods listed in the Misc Hacks section of this app. Q:What is a botnet? A: A botnet is where yo… Read More
  • Creating a keylogger A keylogger is a program that runs in the background on someones computer that logs every key they press, and then sends the log of all the pressed keys to the attacker. This essentially allows you the ability to collect … Read More
Web Hosting