NTLM Kerberos bcrypt Wallets File Recovery Database Hashes WiFi Cracking Disk Encryption About Get Started
ENES中文RU

WiFi Password Cracking Service

Recover WiFi network passwords from WPA/WPA2 PMKID captures and 4-way handshakes. GPU-powered attacks on captured wireless traffic.

Submit WiFi Hash →

How WiFi Cracking Works

WPA/WPA2 PMKID (Mode 22000)

PMKID is the modern approach to WiFi cracking — it doesn't require a full 4-way handshake or a connected client. Tools like hcxdumptool can capture the PMKID from the access point directly. Hashcat mode 22000 handles both PMKID and EAPOL (handshake) formats in one unified mode.

Capture Methods

Attack Strategy

WPA/WPA2 uses PBKDF2-SHA1 with 4096 iterations, making it moderately slow. Our approach:

  1. Common WiFi passwords — Router defaults, ISP-specific patterns, regional password lists
  2. Phone number patterns — 8-10 digit patterns common for WiFi passwords
  3. Dictionary + rules — Standard wordlists with mutation rules
  4. Targeted masks — Based on password hints (length, character types)

What To Send Us

Send the .22000 hash file (output from hcxpcapngtool) or the raw .pcapng capture. If you have any hints about the password (ISP, router model, approximate length), include those.

Pricing

WiFi password cracking: $150 per network. No result = no charge.

FAQ

Do I need to capture the handshake myself?
Yes — you need to capture either a PMKID or a 4-way handshake from the target network using tools like hcxdumptool or airodump-ng. We crack the hash, not capture the traffic.
What's the success rate?
Depends on password complexity. Default router passwords and common patterns have high success. Long random passwords are unlikely.
WPA3?
WPA3 uses SAE (Simultaneous Authentication of Equals) which is resistant to offline attacks. We currently only support WPA/WPA2.

Related Services

Have a WiFi Hash
to Crack?

Send your .22000 file. Free assessment.

@HashCrackNet contact@hashcrack.net