-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

BackTrack 5 Wireless Penetration Testing Beginner's Guide
By :

Follow the given instructions to get started:
Let us first connect to our access point Wireless Lab and set the access point to use WPA-PSK. We will set the WPA-PSK passphrase to abcdefgh, so that it is vulnerable to a dictionary attack:
We start airodump-ng
with the command airodump-ng
–bssid
00:21:91:D2:8E:25
–channel
11
–write
WPACrackingDemo mon0
, so that it starts capturing and storing all packets for our network:
Now we can wait for a new client to connect to the access point, so that we can capture the four-way WPA handshake or we can send a broadcast de-authentication packet to force clients to reconnect. We do the latter to speed things up:
As soon as we capture a WPA handshake, airodump-ng
will indicate it on the top-right corner of the screen with a WPA
Handshake:
followed by the access point's BSSID:
We can stop airodump-ng
now. Let's open up the cap
file in Wireshark and view the four-way handshake. Your Wireshark terminal should...
Change the font size
Change margin width
Change background colour