WPA pre-shared key-cracking

Now we will use the Aircrack-ng suite of tools against a WPA2 wireless network. The process involves identifying our target network, capturing the four-way handshake, and then utilizing a wordlist to brute-force the passcode that, in combination with the wireless network's SSID, is the pre-shared key. By cracking the passcode, we will then be able to authenticate to the target wireless network:

  1. Ensure that you have your wireless network card inserted and that it is working properly. For this, enter the following command into the command line:
    # iwconfig

The command should output something similar to the following screenshot. If you do not see the wireless interface, ensure that it is properly configured:

Get Kali Linux 2018: Assuring Security by Penetration Testing - Fourth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.