Home Network Security

    Wi-Fi Password Recovery for Home Networks

    Lost the password to your own Wi-Fi router? Our advanced recovery service helps home network owners recover forgotten WPA/WPA2 passwords from handshake capture files — quickly, securely, and affordably.

    WPA/WPA2 recovery
    High-performance
    Results within 24h
    .hccapx / .cap / .pcap

    How Wi-Fi Recovery Works

    1

    Capture Handshake

    Use Aircrack-ng, Wireshark, or hcxdumptool on your own network to record the WPA handshake.

    2

    Server-Powered Recovery

    Our powerful servers test billions of password candidates per second using curated wordlists and mutation rules.

    3

    Get Your Password

    Pay $39.99 only on success.

    What Is WPA/WPA2 Password Recovery?

    WPA (Wi-Fi Protected Access) and WPA2 are the most widely used security protocols for home and business wireless networks. When you set a password on your router, that password is used as a Pre-Shared Key (PSK) to encrypt all communication between your devices and the access point.

    Over time, it's common to forget this password — especially if it was set years ago, changed by an ISP technician, or if the router's label has faded. Many users find themselves locked out of their own network after a factory reset, device migration, or simply because the saved password was lost when a computer was replaced.

    Wi-Fi password recovery works by analyzing a handshake capture — a recording of the encrypted authentication exchange that happens when any device connects to the network. By testing millions of candidate passwords against this captured handshake, the correct password can be identified without ever needing physical access to the router.

    Our service uses powerful dedicated servers to dramatically accelerate this process. What would take a home computer weeks or months can be accomplished in hours or even minutes on our infrastructure.

    Understanding the Four-Way Handshake

    The WPA/WPA2 authentication process uses a mechanism called the four-way handshake. This is a series of four EAPOL (Extensible Authentication Protocol over LAN) packets exchanged between a client device and the access point when the client connects (or reconnects) to the network.

    During this process, both sides prove knowledge of the password without transmitting it directly. Instead, they exchange nonces (random values) and derive temporary encryption keys. The critical information needed for offline password testing is contained within these handshake messages.

    To capture a handshake, you need to be within Wi-Fi range of your own network and use a monitoring tool while a device connects. Many routers also broadcast PMKID (Pairwise Master Key Identifier) values, which can be captured without waiting for a client to connect — making the process even simpler for network owners.

    Important Legal Notice

    This service is intended exclusively for authorized network owners recovering their own forgotten passwords, or for security professionals conducting authorized penetration testing. Unauthorized interception of network traffic or attempting to access networks you do not own is illegal in most jurisdictions and is strictly prohibited under our Terms of Service.

    Supported Capture Formats

    .hccapx — Hashcat Native Format

    The .hccapx format is the native binary format used by Hashcat for WPA/WPA2 cracking. It contains the essential handshake data in a compact, standardized structure. If you've used tools like cap2hccapx, hcxpcapngtool, or the Hashcat online converter, your file is likely in this format. This is the most efficient format for our processing pipeline and yields the fastest results.

    .cap / .pcap — Standard Capture Files

    Captured directly from tools like Aircrack-ng (airodump-ng), Wireshark, or tcpdump, these are the standard packet capture formats used across the networking industry. Our system automatically extracts the WPA handshake data from these files, converts it to the appropriate internal format, and begins processing. You don't need to pre-convert — just upload the raw capture.

    .pcapng — Next-Generation Capture

    The PCAP Next Generation format is the modern successor to .pcap. It supports richer metadata, multiple interfaces, and enhanced timestamps. Tools like modern versions of Wireshark and hcxdumptool output this format by default. We fully support .pcapng files and will automatically extract the relevant handshake or PMKID data.

    How the Recovery Process Works

    1

    Capture the Handshake

    Use a tool like Aircrack-ng, Wireshark, or hcxdumptool on your own network to record the WPA handshake. This requires being within range of your Wi-Fi router and waiting for a device to connect (or triggering a reconnection). The resulting file will be in .cap, .pcap, .pcapng, or .hccapx format.

    2

    Upload to Our Platform

    Upload your capture file through our secure, encrypted upload page. We accept files up to 100 MB. Your file is processed immediately and never stored longer than necessary. All data is encrypted in transit using TLS 1.3.

    3

    High-Performance Analysis

    Our powerful servers run advanced dictionary attacks, rule-based mutations, and pattern-based mask attacks against your handshake. We test billions of password candidates per second, using curated wordlists built from millions of real-world leaked passwords and common Wi-Fi naming patterns.

    4

    Receive Your Password

    If the password is found, you'll be notified by email. You can then log in to your account to view the recovered password. Our pay-on-success model means you only pay when we actually recover the key — no upfront costs beyond the processing fee.

    How to Capture a WPA Handshake (Step-by-Step)

    Before you can recover your Wi-Fi password, you need to capture a WPA handshake from your own network. This is a recording of the authentication exchange that happens when any device connects to your router. Below are instructions for the most common tools.

    Prerequisites

    You need a Wi-Fi adapter that supports monitor mode (most external USB adapters with Atheros, Ralink, or Realtek chipsets). Internal laptop adapters usually do NOT support monitor mode. Popular adapters: Alfa AWUS036ACH, TP-Link TL-WN722N (v1), Panda PAU09.

    Method 1: Aircrack-ng (Linux — Recommended)

    1

    Install Aircrack-ng

    sudo apt install aircrack-ng
    2

    Find your wireless interface

    sudo airmon-ng

    Note your interface name (e.g., wlan0)

    3

    Enable monitor mode

    sudo airmon-ng start wlan0

    Interface becomes wlan0mon

    4

    Scan for your network

    sudo airodump-ng wlan0mon

    Find your network's BSSID (MAC address) and channel number

    5

    Capture the handshake

    sudo airodump-ng -c [channel] --bssid [BSSID] -w capture wlan0mon

    Wait for a device to connect to your network. You'll see "WPA handshake: [BSSID]" in the top-right corner when captured.

    6

    (Optional) Force a reconnection of your own device

    sudo aireplay-ng -0 1 -a [BSSID] -c [CLIENT_MAC] wlan0mon

    This sends a deauth packet to your own device, causing it to reconnect and generate a handshake. Only do this on your own network.

    Upload the .cap file

    The file will be saved as capture-01.cap. Upload this file to our platform.

    Method 2: hcxdumptool + hcxpcapngtool (PMKID — Easiest)

    This method can capture PMKID hashes without waiting for a client to connect — it works by simply probing the router.

    1

    Install tools

    sudo apt install hcxdumptool hcxtools
    2

    Capture PMKID & handshakes

    sudo hcxdumptool -i wlan0 -o capture.pcapng --active_beacon --enable_status=15

    Run for 1–5 minutes. Press Ctrl+C to stop.

    Upload the .pcapng file

    Upload capture.pcapng directly — we'll extract the PMKID or handshake automatically.

    Method 3: Windows (CommView / Acrylic WiFi)

    Windows doesn't natively support monitor mode, but commercial tools like CommView for WiFi or Acrylic Wi-Fi Professional can capture handshakes with compatible adapters. Both tools export standard .cap files that can be uploaded directly.

    Alternatively, you can use a Linux live USB (Kali Linux, Parrot OS) to boot into Linux temporarily and use Aircrack-ng as described above — no installation required.

    Don't want to capture yourself?

    If you've already been given a .hccapx, .cap, or .pcapng file by a network administrator or security professional, simply upload it directly. No capture step needed.

    Technical Details & Attack Methodology

    WPA/WPA2-PSK uses PBKDF2-SHA1 with 4096 iterations to derive encryption keys from the password and SSID. This makes each password guess computationally expensive — which is why powerful dedicated servers make such a dramatic difference.

    Dictionary Attacks: We maintain a curated library of over 10 billion password entries compiled from publicly available breach databases, common password patterns, and Wi-Fi-specific wordlists. These include ISP-default passwords, common router password formats (e.g., 8-digit numeric codes from popular manufacturers), and linguistically diverse entries covering multiple languages.

    Rule-Based Mutations: Beyond raw dictionary entries, we apply thousands of transformation rules — appending numbers, replacing characters with symbols, capitalizing patterns, combining words, and applying leet-speak substitutions. A single base word can generate thousands of unique candidates.

    Mask Attacks: For passwords that follow a known structure (e.g., "word + 4 digits"), we can systematically enumerate all possibilities within that pattern. This is particularly effective for ISP-generated default passwords that follow predictable formats.

    PMKID Attack: If your capture file contains a PMKID (available on many modern routers), we can test passwords without requiring a complete four-way handshake. This is faster and more reliable since the PMKID can be captured from a single probe request.

    WPA vs. WPA2 vs. WPA3: What's the Difference?

    WPA (2003): The original Wi-Fi Protected Access protocol was introduced as an interim replacement for the deeply flawed WEP standard. WPA uses TKIP (Temporal Key Integrity Protocol) for encryption. While significantly better than WEP, TKIP has known vulnerabilities. WPA handshakes are fully supported by our recovery service.

    WPA2 (2004): The successor to WPA, using AES-CCMP for encryption instead of TKIP. WPA2 has been the standard for home and enterprise networks for nearly two decades. The PSK (Pre-Shared Key) variant used in home networks derives keys using PBKDF2 with 4096 iterations of HMAC-SHA1. This is the most common protocol we encounter and recover passwords for.

    WPA3 (2018): The latest generation uses SAE (Simultaneous Authentication of Equals), also known as the Dragonfly protocol. WPA3 was specifically designed to resist offline dictionary attacks — meaning capturing a handshake does not provide enough information for offline password testing. We do not support WPA3 recovery because the protocol fundamentally prevents the type of offline analysis that our service performs.

    If you're unsure which protocol your router uses, check the router's admin page. Most routers manufactured before 2020 default to WPA2. Even newer routers often run in WPA2/WPA3 mixed mode, and captures from the WPA2 side remain recoverable.

    Frequently Asked Questions

    Recovery PRO

    Wi-Fi Recovery
    $19.99+$49.99
    upfront + on success
    48-hour deep analysis
    10B+ password dictionary
    Advanced rule-based mutations
    WPA & WPA2 support
    PMKID attack included
    Email notification
    Pay only if password found
    Upload Handshake

    Compatible Capture Tools

    Hashcat (.hccapx)

    Native binary format

    Aircrack-ng (.cap)

    airodump-ng captures

    Wireshark (.pcap)

    Network analyzer

    hcxdumptool (.pcapng)

    Modern PMKID capture

    tcpdump (.pcap)

    CLI packet capture

    Server Performance

    2.5B+

    PMKID candidates/sec

    1.2M+

    WPA2 PBKDF2 hashes/sec

    10B+

    Password dictionary entries

    Your Privacy

    TLS 1.3 encrypted upload

    Only handshake data analyzed

    Automatic deletion after processing

    Zero-knowledge processing

    Ready to Recover Your Wi-Fi Password?

    Upload your handshake capture file and let our powerful servers handle the rest. Pay only when we find your password.