WPA/WPA2-PSK and hacking?

Hello world!
Trying to understand the authentication Protocol (while I was writing felt like a professional) WPA/WPA2-PSK(and you thought... because the title is not readable) specifically want to hack(YET your) access point. Currently using Kali linux and I airgeddon(aka true hacker) had intercepted the handshake.cap(only how to read it?) and then I would like to write code for password guessing, but I don't know how.
At the moment I realized that
PTK = Pre-Shared Key + SSID, Nounce AP and client MAC address AP client
and so the idea of a handshake.cap(which I can't read) must already contain everything except the Pre-Shared Key but what to do next is not clear.
August 19th 19 at 23:36
2 answers
August 19th 19 at 23:38
Read the book, Kali Linux and Wireless Penetration Testing - there is written and how it works, and what are popular types of attacks, and, of course, examples with detailed explanations.
Question - "how to mix 6 variables and compare with the seventh?"
The answer is read a book
The questions only became more, in particular from the side of common sense - kale66 commented on August 19th 19 at 23:41
: If you do not understand what is written in this book on the topic, wpa/wpa2 and not understood yet how it works (the issue seems that all is well, otherwise you would know exactly what *.cap files and is asking a narrower question than "write the code for the password, but I don't know how") - learn materiel, then return to the question with your new knowledge.
If you know - there is a desire to respond to something in the spirit of STFW, because I for 15 seconds search on github found software on python, which clearly shows the desired algorithm (link intentionally leave will not) - josianne_Mosciski commented on August 19th 19 at 23:44
: Here the main question is not .cab files, in fact this is what I wrote about in cab brackets. The main problem in case of reproduction authentication points of access of wi-fi to check the password.
And about the second paragraph - it is also about the cab or is it still on? - kale66 commented on August 19th 19 at 23:47
: The second paragraph on the topic, on github there are implementations of this in different languages - for example here there is clearly something https://github.com/dxa4481/WPA2-HalfHandshake-Crack (in the code itself did not penetrate, judging by the names of functions like pbkdf2 and a General idea of what is happening) - josianne_Mosciski commented on August 19th 19 at 23:50
August 19th 19 at 23:40
To velosipedit fun and all, but better to read the source crack_wpa_thread() from aircrack-ng
To velosipedit? and Google I know how to use. I asked a question just because you do not understand anything in the 6300 hundred lines of high-level code or in the maximum stretched articles. And why so much code when you have to explain like a mix between the 6 variables and compare with the seventh? - kale66 commented on August 19th 19 at 23:43

Find more questions by tags HackingNetwork administrationWi-Fi