WPA/WPA2 Attacks
Start airmon-ng and airodump-ng and output it to <airodump-output.cap>
1. De-authentication attack
Using de-auth attack knocks off the client from the wifi and when it attempts to be reconnected a 4-way handshake will be captured. This can be used by aircrack-ng to find the password by dictionary attack
When client reconnects, you will see the top right of airodump-ng screen indicates that handshake is now captured.
If you use wireshark to check the contents of packets <output.cap>. Filter the contents of the cap file by using "EAPOL" and observe that the 4-way handshake is captured.
2. Aircrack-ng to discover WPA password
Airolib-ng - creating PMK database for faster cracking
Info: How WPA passwords are "cracked"?
There are 2 things needed to crack WPA password. (1) handshake (2) wordlist
In short, the Handshake is made up of the Password + the following "ingredients":
SP Address
STA Address
AP Nonce
STA Nonce
EAPOL
Payload
Which generates a MIC (Message integrity code). Now this value changes if the "ingredients" including the Password value changes.
To crack the Password, the attack is basically taking each word form the wordlists we provide and cook it with the "ingredients" to see if the MIC matches the one with the rightful password.
Last updated