Unlike WEP, which can be broken using a statistical analysis of a large number of packets, WPA decryption requires the attacker to create specific packet types that reveal details, such as the handshake between the access point and the client.
To attack a WPA transmission, the following steps should be performed:
- Start the wireless adaptor and use the ifconfig command to ensure that the monitor interface is created.
- Use airodump-ng -wlan0 to identify the target network.
- Start capturing traffic between the target access point and the client using the following command:
root@kali:~# airodump-ng --bssid<MAC Address> -c 1 --showack-write /root/Desktop/Wifi/nameofthewifi
Set -c to monitor a specific channel, --write to write ...