O'Reilly logo

Penetration Testing with Perl by Swizec Teller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

WPA2 passphrase cracking with Perl

WPA2 is a very common method to attempt to secure 802.11 wireless data transmissions. A wealth of perfectly good WPA2 cracking software exists, but for the purpose of learning exactly how these work, we will be coding our own in Perl from scratch. Let's begin by briefly looking at how the handshake process works.

Four-way Handshake

When a wireless station wants to authenticate to a Basic Service Set (BSS) or wireless network, it uses a supplicant, or software to mitigate the communication to the authenticator at layer 2. Any layer above this in the OSI model is pretty much off-limits until the supplicant software has finished a successful authentication. An example of a supplicant would be WiCD, the Microsoft ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required