This section will walk you through the process of gathering WPA keys using two different methods:
- Social engineering through SSID manipulation and social engineering with fluxion
- Brute force cracking of gathered data using hashcat
This section will walk you through the process of gathering WPA keys using two different methods:
In order to complete this recipe, you will need to follow the commands laid out in the section Scanning for wireless networks and place your wireless network adapter into the monitor mode.
You can confirm this by running the following:
root@kali:~/wireless# iw dev
Confirm that the interface wlan0mon is set to type monitor: