O'Reilly logo

Kali Linux Intrusion and Exploitation Cookbook by Ishan Girdhar, Dhruv Shah

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Cracking WPA/WPA2 encryption

In this recipe, we are going to see how attackers break WPA2 encryption. WPA Wi-Fi protected access is the successor to WEP encryption after it was realized that WEP encryption failed. In WPA2-PSK we force the victim into multiple authentication handshakes with the wireless router and capture all the traffic as the handshakes contain the pre-shared key. Once we gain a substantial amount of handshakes, we try dictionary-based password guessing against the captured packets to see if we can successfully guess the password. In this recipe, we are going to see how WPA/WPA2 can be cracked.

Getting ready

For this we are going to rely exclusively on the aircrack-ng suite; since it is pre-built in Kali we don't need to configure ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required