From the course: Ethical Hacking: Wireless Networks
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Using WiFite and Aircrack-ng to test WPA passwords - Linux Tutorial
From the course: Ethical Hacking: Wireless Networks
Using WiFite and Aircrack-ng to test WPA passwords
- [Instructor] We've seen a number of WPA and WPA2 networks during our monitoring. So now it's time to see how well they're protected by extracting data from them, which might lead us to the network password. We've look at WiFite previously for extracting web passwords and I'll use it again for extracting the WPA handshake. WiFite sends client deauthentication requests to force a reauthentication handshake, which can be captured and subsequently analyzed. I'll instruct WiFite to give me a random MAC address and to verify the handshake using Aircrack. WiFite starts scanning for networks, displaying a list of all the networks it finds and on the right, shows active clients, devices associated with those access points. I'll let WiFite run for a few moments to capture multiple clients on my TPG-83NJ network. Okay, I can now press Control + C and select the target. WiFite starts with a couple of WPS attacks. I can press Control +…
Contents
-
-
-
Understanding wireless networks5m 52s
-
(Locked)
Selecting an antenna for wireless network testing5m 16s
-
(Locked)
Configuring security in wireless networks3m 26s
-
(Locked)
Understanding the Wi-Fi Protected Setup (WPS)5m 20s
-
(Locked)
Extracting WEP passwords using Wifite2m 9s
-
(Locked)
Extracting network passwords through WPS2m 35s
-
(Locked)
Using WiFite and Aircrack-ng to test WPA passwords2m
-
(Locked)
Using Pixiedust to recover keys2m 44s
-
(Locked)
A first look at WPA32m 26s
-
(Locked)
Understanding Dragonblood2m 37s
-
-
-
-
-
-