From the course: Ethical Hacking: Wireless Networks

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Using WiFite and Aircrack-ng to test WPA passwords

Using WiFite and Aircrack-ng to test WPA passwords - Linux Tutorial

From the course: Ethical Hacking: Wireless Networks

Start my 1-month free trial

Using WiFite and Aircrack-ng to test WPA passwords

- [Instructor] We've seen a number of WPA and WPA2 networks during our monitoring. So now it's time to see how well they're protected by extracting data from them, which might lead us to the network password. We've look at WiFite previously for extracting web passwords and I'll use it again for extracting the WPA handshake. WiFite sends client deauthentication requests to force a reauthentication handshake, which can be captured and subsequently analyzed. I'll instruct WiFite to give me a random MAC address and to verify the handshake using Aircrack. WiFite starts scanning for networks, displaying a list of all the networks it finds and on the right, shows active clients, devices associated with those access points. I'll let WiFite run for a few moments to capture multiple clients on my TPG-83NJ network. Okay, I can now press Control + C and select the target. WiFite starts with a couple of WPS attacks. I can press Control +…

Contents