Cracking WPA/WPA2 encryption
In this recipe, we are to see how attackers break WPA2 encryption. WPA Wi-Fi protected access is the successor to WEP encryption after it was realized that WEP encryption failed. In WPA2-PSK we force the victim into multiple authentication handshakes with the wireless router and capture all the traffic as the handshakes contain the pre-shared key. Once we gain a substantial amount of handshakes, we try dictionary-based password guessing against the captured packets to see if we can successfully guess the password. In this recipe, we are going to see how WPA/WPA2 can be cracked.
Getting ready
For this we are going to rely exclusively on the aircrack-ng
suite; since it is pre-built in Kali we don't need to configure much. One other thing we require is a wireless router with WPA/WPA2 encryption. Let us begin.
How to do it...
- First we will switch our wireless device to monitor mode using the following command:
airmon-ng start wlan0
- We can list all available wireless...