Skip to Main Content
Mastering Kali Linux for Advanced Penetration Testing - Third Edition
book

Mastering Kali Linux for Advanced Penetration Testing - Third Edition

by Vijay Kumar Velu, Robert Beggs
January 2019
Intermediate to advanced content levelIntermediate to advanced
548 pages
12h 7m
English
Packt Publishing
Content preview from Mastering Kali Linux for Advanced Penetration Testing - Third Edition

Brute-force attacks

Unlike WEP, which can be broken using a statistical analysis of a large number of packets, WPA decryption requires the attacker to create specific packet types that reveal details, such as the handshake between the access point and the client.

To attack a WPA transmission, the following steps should be performed:

  1. Start the wireless adapter and use the ifconfig command to ensure that the monitor interface has been created.
  2. Use airodump-ng -wlan0 to identify the target network.
  1. Start capturing traffic between the target access point and the client using the following command:
root@kali:~# airodump-ng --bssid F0:7D:68:44:61:EA -c 11 --showack --output-format pcap --write <OUTPUT LOCATIOn> wlan0mon
  1. Set -c to monitor a ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Mastering Kali Linux for Advanced Penetration Testing, Second Edition - Second Edition

Mastering Kali Linux for Advanced Penetration Testing, Second Edition - Second Edition

Vijay Kumar Velu
Kali Linux 2018: Assuring Security by Penetration Testing - Fourth Edition

Kali Linux 2018: Assuring Security by Penetration Testing - Fourth Edition

Shiva V. N. Parasram, Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Tedi Heriyanto, Shakeel Ali

Publisher Resources

ISBN: 9781789340563Supplemental Content