Brute-force attacks

Unlike WEP, which can be broken using a statistical analysis of a large number of packets, WPA decryption requires the attacker to create specific packet types that reveal details, such as the handshake between the access point and the client.

To attack a WPA transmission, the following steps should be performed:

  1. Start the wireless adapter and use the ifconfig command to ensure that the monitor interface is created.
  2. Use airodump-ng -wlan0 to identify the target network.
  3. Start capturing traffic between the target access point and the client using the following command:
root@kali:~# airodump-ng --bssid<MAC Address> -c 1 --showack-write /root/Desktop/Wifi/nameofthewifi

Set -c to monitor a specific channel, use -write to ...

Get Mastering Kali Linux for Advanced Penetration Testing - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.