0% found this document useful (0 votes)
22 views6 pages

Lab 3

The document summarizes the steps to initiate WPA cracking: 1) configure the network interface and enable monitor mode on the wireless card; 2) use airodump-ng to scan for accessible networks and select a target; 3) capture traffic from the target access point using airodump-ng and save it to a file to obtain the handshake; 4) use aircrack-ng with a dictionary file to crack the WPA key.

Uploaded by

mateokruti14
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views6 pages

Lab 3

The document summarizes the steps to initiate WPA cracking: 1) configure the network interface and enable monitor mode on the wireless card; 2) use airodump-ng to scan for accessible networks and select a target; 3) capture traffic from the target access point using airodump-ng and save it to a file to obtain the handshake; 4) use aircrack-ng with a dictionary file to crack the WPA key.

Uploaded by

mateokruti14
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

The process of initiating WPA cracking begins with configuring your network interface using the

"ifconfig" command, which helps you identify available network interfaces. If your network card is
recognized as "wlan0," the next step is to enable "monitor" mode on your wireless network card.
This mode allows you to capture packets passively without establishing a connection with any
network. It's important to note that the availability of this mode depends on your network card's
driver, and Windows supports this mode for only a limited number of network cards. You can
activate monitor mode by executing the command "sudo airmon-ng wlan0mon”.

The following step involves identifying and choosing your target network. To accomplish this, you
can use the "airodump-ng wlan0mon" command. This command scans all channels and provides a
list of accessible access points along with their associated clients within your proximity. Once you've
picked your target network, make sure to take note of its Channel and BSSID (MAC address).
Next, you'll capture traffic from the selected access point and save it into a file. To do this, use the
command "airodump-ng –bssid (MAC address of the access point) –channel (AP channel) –write
(name of the new file to store the data) wlan0mon." You can also wait for a new client to connect to
the access point, which will allow you to capture the four-way WPA handshake.
To crack the key, you'll need a word dictionary that contains common words. The aircrack-ng utility
utilizes this dictionary file to attempt various combinations of passphrases in an effort to crack the
key. If the passphrase is found in the dictionary file, the utility will eventually succeed in cracking the
key.
The WPA encryption has been successfully bypassed, and the password is "68643584".

You might also like