O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

How to do it...

In order to crack the WEP key for an access point running the protocol, there is a process involved that requires the collection of what are known as Initialization Vectors (IVs). The problem with this process is that under normal conditions a network does not generate a lot of these items in a short period of time. Under normal conditions this means we would have to wait a prolonged period of time to get enough IVs to retrieve the network key. However, we can speed up this process by utilizing the information from our previous recipe, together with some new skills, to retrieve the key. To put it simply, we will inject packets into the network in an effort to get the access point to generate a large number of packets in a ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required