-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

BackTrack 5 Wireless Penetration Testing Beginner's Guide
By :

Follow these instructions to get started:
Let us first set up our legitimate access point with WEP for the network Wireless Lab with the key ABCDEFABCDEFABCDEF12 in Hex:
Let us connect our client to it and ensure that the connection is successful using airodump-ng
as shown next:
Let us unplug the access point and ensure the client is in the un-associated stage and searching for the WEP network Wireless Lab:
Now we use airbase-ng
to bring up an access point with Wireless Lab as the SSID with the parameters shown next:
As soon as the client connects to this access point, airbase-ng
starts the Caffe-Latte attack as shown:
We now start airodump-ng
to collect the data packets from this access point only, as we did before in the WEP-cracking case:
We also start aircrack-ng
as in the WEP-cracking exercise we did before to begin the cracking process. The command line would be aircrack-ng filename
where filename is the name of the file created by airodump...
Change the font size
Change margin width
Change background colour