O'Reilly logo

BackTrack 5 Wireless Penetration Testing Beginner’s Guide by Vivek Ramachandran

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Time for action connecting to a WPA network

  1. In the case of WPA, the matter is a bit more complicated. The iwconfig utility cannot be used with WPA/WPA2 Personal and Enterprise, as it does not support it. We will use a new tool called WPA_supplicant, for this lab. To use WPA_supplicant for a network, we will need to create a configuration file as shown in the screenshot. We will name this file wpa-supp.conf:
    Time for action connecting to a WPA network
  2. We will then invoke the WPA_supplicant utility with the following options -Dwext -iwlan0 c wpa-supp.conf to connect to the WPA network, we just cracked as shown. Once the connection is successful, WPA_supplicant will give you a message Connection ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required