


So we made this file shorter which means we can test more AP’s in less time.įinally, lets rename this file to wpa.lst. Let’s see how many passwords this file contains: wc -l newrockyou.txt cat rockyou.txt | sort | uniq | pw-inspector -m 8 -M 63 > newrockyou.txt So we are saving this file as newrockyou.txt name. (well, you could just leave this line, but it is completely up to you). īecause WPA2 minimum password requirement is 8 characters, let’s parse this file to filter out any passwords that is less than 8 characters and more than 63 characters. Let’s copy one of best dictionary file to root directory. Kali Linux provides some dictionary files as part of its standard installation.

To do a Dictionary attack, we need to grab a dictionary file.
