Time for action – cracking WPA-PSK weak passphrase
Follow the given instructions to get started:
- Let's first connect to our access point
Wireless Lab
and set the access point to use WPA-PSK. We will set the WPA-PSK passphrase toabcdefgh
so that it is vulnerable to a dictionary attack: - We start
airodump-ng
with the following command so that it starts capturing and storing all packets for our network:airodump-ng --bssid 00:21:91:D2:8E:25 --channel 11 --write WPACrackingDemo wlan0mon
The following screenshot shows the output:
- Now, we can wait for a new ...
Get Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.