Brute-force attacks

Unlike WEP, which can be broken using a statistical analysis of a large number of packets, WPA decryption requires the attacker to create specific packet types that reveal details, such as the handshake between the access point and the client.

To attack a WPA transmission, the following steps should be performed:

  1. Start the wireless adapter and use the ifconfig command to ensure that the monitor interface has been created.
  2. Use airodump-ng -wlan0 to identify the target network.
  1. Start capturing traffic between the target access point and the client using the following command:
root@kali:~# airodump-ng --bssid F0:7D:68:44:61:EA -c 11 --showack --output-format pcap --write <OUTPUT LOCATIOn> wlan0mon
  1. Set -c to monitor a ...

Get Mastering Kali Linux for Advanced Penetration Testing - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.