Crack WPA keys via recorded 4-Way Handshake. This version requires that the 4-Way Handshake is in an isolated pcap file, you can use Wireshark for example, to acquire a result similar to this:
The current implementation was tested on Wireshark’s
wpa-Induction.pcap sample capture.
go run cr4gg.go --ssid Coherer -f $HOME/handshake.pcap -w $HOME/wordlist.txt -v
This project’s solely purpose is to gain more knowledge about wifi security and the language go. Do not use this tool to attack networks you do not have the permission to pentest on.