![]() These handshakes occur whenever a device connects to the network, for instance, when your neighbor returns home from work. You don’t have to know anything about what that means, but you do have to capture one of these handshakes in order to crack the network password. WPA/WPA2 uses a 4-way handshake to authenticate devices to the network. Remember the BSSID MAC address and channel ( CH) number as displayed by airodump-ng, as we will need them both for the next step. WPA2 CCMP PSK Comcast_2EEA-EXTīC:EE:7B:8F:48:28 -85 119 10 0 1 54e WPA2 CCMP PSK rootĮC:1A:59:36:AD:CA -86 210 28 0 1 54e WPA2 CCMP PSK belkin.dcaįor the purposes of this demo, we will choose to crack the password of my network, “hackme”. You should see output similar to what is below. Start listening to 802.11 Beacon frames broadcast by nearby wireless routers using your monitor interface: airodump-ng mon0 You should now see a new monitor mode interface listed (likely mon0 or wlan0mon). ![]() Next, we will place the interface into monitor mode: airmon-ng start wlan0 ![]() We will assume your wireless interface name is wlan0 but be sure to use the correct name if it differs from this. If you do not see an interface listed then your wireless card does not support monitor mode ? See here for more info.)īegin by listing wireless interfaces that support monitor mode with: airmon-ng ![]() Have a wireless card that supports monitor mode (I recommend this one.Have Aircrack-ng installed ( sudo apt-get install aircrack-ng).Are running a debian-based linux distro (preferably Kali linux).Have a general comfortability using the command-line. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |