Trying to understand the authentication Protocol (while I was writing felt like a professional) WPA/WPA2-PSK(and you thought... because the title is not readable) specifically want to hack(YET your) access point. Currently using Kali linux and I airgeddon(aka true hacker) had intercepted the handshake.cap(only how to read it?) and then I would like to write code for password guessing, but I don't know how.
At the moment I realized that PTK = Pre-Shared Key + SSID, Nounce AP and client MAC address AP client
and so the idea of a handshake.cap(which I can't read) must already contain everything except the Pre-Shared Key but what to do next is not clear.