O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Step three – airdump-ng and traffic capture

From the list of access points in this screenshot, you will note that there are two WEP-enabled access points, of which we will choose the one named 7871.

airodump-ng --bssid 0A:86:3B:74:22:77 -c 6 -w crack mon0 

This will start capturing packets from the SSID 7871 on channel 6 and write them to file crack, which will be in the pcap format. The problem with this method is that we need to capture a lot of packets or traffic to be able to actually break or retrieve the key. If you're someone who likes being patient, you can wait for 50 or 60,000—or even 100,000—packets to be captured before you proceed with the cracking process. However, that's not good enough; we want the key and we want to get it ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required