Hashcat which is primarily built for brute forcing different kind of hashes using different kind of attack vectors, supports cracking for two of badly known WPA/WPA2 attacks. Use the guides Capturing WPA2 and Capturing WPA2 PMKID to capture the WPA2 handshake Then converted to the right format depending on the captured method and moved over to the Windows client to be cracked.
![spectrum wpa2 wordlist spectrum wpa2 wordlist](https://www.mdpi.com/electronics/electronics-07-00284/article_deploy/html/images/electronics-07-00284-g004-550.jpg)
It's really important that you use strong WiFi passwords.
#Spectrum wpa2 wordlist full#
For a full list of Hashcat modes, you can head over to their website.
![spectrum wpa2 wordlist spectrum wpa2 wordlist](https://victoria.dev/blog/wpa-key-wpa2-wpa3-and-wep-key-wi-fi-security-explained/wep.png)
![spectrum wpa2 wordlist spectrum wpa2 wordlist](https://www.intego.com/mac-security-blog/wp-content/uploads/2016/03/iOS-9.3-Update.png)
#Spectrum wpa2 wordlist code#
This is the code for a WPA2 handshake Hashcat uses. For our brute force example, 2500 is what we need.