-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Kali Linux Wireless Penetration Testing Beginner???s Guide
By :

Follow these instructions to get started:
Let's first set up our legitimate access point with WEP for the network Wireless Lab
with the ABCDEFABCDEFABCDEF12
key in hex:
Let's connect our client to it and verify that the connection is successful using airodump-ng
, as shown in the following screenshot:
Let's unplug the access point and ensure that the client is in the unassociated stage and searches for the WEP network Wireless Lab
.
Now, we use airbase-ng
to bring up an access point with Wireless Lab
as the SSID, with the parameters airbase-ng -a <AP MAC> --essid <AP SSID> -L -W 1 -c <channel> wlan0mon
, as shown here:
As soon as the client connects to this access point, airbase-ng
starts the Caffe Latte attack, as shown here:
We now start airodump-ng
to collect the data packets from this access point only, as we did before in the WEP cracking scenario airodump-ng wlan0mon -c <AP channel> --essid <AP SSID> -w <prefix...
Change the font size
Change margin width
Change background colour