O'Reilly logo

Mastering Kali Linux for Advanced Penetration Testing - Second Edition by Vijay Kumar Velu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Brute force attacks

Unlike WEP, which can be broken using a statistical analysis of a large number of packets, WPA decryption requires the attacker to create specific packet types that reveal details, such as the handshake between the access point and the client.

To attack a WPA transmission, the following steps should be performed:

  1. Start the wireless adaptor and use the ifconfig command to ensure that the monitor interface is created.
  2. Use airodump-ng -wlan0 to identify the target network.
  3. Start capturing traffic between the target access point and the client using the following command:
root@kali:~# airodump-ng --bssid<MAC Address> -c 1 --showack-write /root/Desktop/Wifi/nameofthewifi

Set -c to monitor a specific channel, --write to write ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required