Each data packet has an associated three byte Initialization Vector called IV’s. The basic idea of this attack is to capture as much traffic as possible using airodump-ng. Have one other computer, tablet, or smartphone connected to it wirelessly since the encrypted data between the two will need to be captured. Setup a old router and log into it setting it up as WEP for wireless security to use as a test router. Even though WEP is rarely seen anymore it still does pop up every now and again.Īlso this is a good place to start for someone new to wireless pen testing before moving on to WPA encryption. WEP is the original widely used encryption standard on routers. Note: If you are using a updated version of Kali and aicrack-ng mon0 interface has been changed to wlan0mon. Next Creating a Dictionary / Wordlist with Crunch Part 8 Using Aircrack and a Dictionary to Crack a WPA Data CaptureĬracking a WPA Capture with the GPU using HashCat Getting a Handshake and a Data Capture, WPA Dictionary Attack
Introduction To Kali and WiFi Pen Testing
This is a multiple part series for someone new to wireless hacking, with pictures and videos.