Wpa wordlist file
![wpa wordlist file wpa wordlist file](https://www.prophethacker.com/wp-content/uploads/2016/10/hacking-wpa-2-password-with-fluxion.png)
#WPA WORDLIST FILE PASSWORD#
If the PMK is valid, then the password that was used to create the PMK is the password for the target AP. It will try all of the passwords, and will combine each password with the name of the target AP to create a PMK, then compare the PMK to the handshake. Now click Enter, and aircrack-ng is going to go through the list of the password. We will use aircrack-ng, the file name that contains the handshake, wep_handshake-01.cap, -w and the name of the wordlist, text.txt. If the PMK wasn't valid, then aircrack-ng tries the next password. The password that was used is the password for the target AP if the PMK is valid. It is encrypted in certain way, and compare the PMK to the handshake. It is not like just combining the password and the BSSID. This PMK is created by using an algorithm called PBKDF2. The aircrack-ng will be going through the wordlist file, combine each password with the name of the target AP, and create a Pairwise Master Key(PMK). Currently there are very powerful and configurable programs that allow us to create a dictionary on demand, such as Crunch.If we know or intuit that the WPA password of a target has, for example, 10 characters and that it only uses uppercase and lowercase letters, we can create a dictionary that has all the combinations and permutations of uppercase and lowercase letters. Now we can use aircrack-ng to crack the key for the target AP. Now we've captured the handshake, and we have a wordlist ready to use. To crack WPA or WPA2, we need to first capture the handshake from the target AP and second have a wordlist which contains a number of passwords that we are going to try.