O'Reilly logo

Kali Linux Wireless Penetration Testing Essentials by Marco Alamanni

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. WPA/WPA2 Cracking

In this chapter, we will examine the Wi-Fi Protected Access (WPA/WPA2) protocol and take a look at the techniques and the tools to recover the encryption key.

The topics covered are as follows:

  • An introduction to WPA/WPA2
  • WPA cracking with Aircrack-ng
  • WPA cracking with Cowpatty
  • WPA cracking with the GPU
  • WPA cracking with automated tools

An introduction to WPA/WPA2

The WPA/WPA2 are two different versions of a security protocol developed by the Wi-Fi Alliance to substitute WEP as the security standard for 802.11 protocols. The WPA protocol was first published in 2003 and was in turn replaced by its successor WPA2 in 2004, as part of the IEEE 802.11i standard. Both WPA and WPA2 support two authentication modes: WPA-Personal

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required