-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition
By :

We will set up a WPA-PSK Honeypot with the ESSID Wireless Lab. The -z 2
option creates a WPA-PSK access point, which uses TKIP:
Let's also start airodump-ng
to capture packets from this network:
Now when our roaming client connects to this access point, it starts the handshake but fails to complete it after Message 2, as discussed previously; however, the data required to crack the handshake has been captured.
We run the airodump-ng
capture file through aircrack-ng
with the same dictionary file as before; eventually, the passphrase is cracked as before.
We were able to crack the WPA key with just the client. This was possible because, even with just the first two packets, we have all the information required to launch a dictionary attack on the handshake.
We recommend setting different WEP keys on the client and trying this exercise a couple of times to gain confidence. You may notice many times that...