Now let’s see all the traffic collected by our wireless interface. We can see below that monitor mode has been enabled on “mon0″. Monitor mode is same as promiscuous mode in wired sniffing. Now we are going to start monitor mode on our wireless interface. We can see that we have a wireless interface wlan0. It lists your wireless interfaces just like ifconfig shows wired interfaces. Once you have booted into Kali Linux, open terminal and type command “ iwconfig”. I am running Kali Linux in live USB mode( see how to make kali live usb) as my laptop has Atheros adapter. ( For this howto, if you are running Kali Linux in Vmware or Virtualbox you need to have a compatible wifi usb adapter). For this howto, I am going to use Kali Linux. So, today we are going to see WPA/WPA2 password cracking with aircrack. They are by far considered most secure for Wifi networks. Both can be configured to use counter cipher block chaining mode(CCM) though. The only difference between WPA and WPA2 is that they use Rivest Cipher(RC4) and Advanced Encryption Standard(AES) encryption algorithms respectively. Both WPA and WPA2 use temporal key integrity protocol(TKIP) for encryption and pre-shared key(PSK) authentication. WPA uses 128 bit key and 48 bit initialization vector while WEP uses 108 bit key with 24 bit initialization vector. It eliminates all known vulnerabilities in WEP(Wired Equivalent Privacy). It is an encryption system to secure WLAN networks. This is a tutorial on how to crack WPA WPA2 with aircrack.
0 Comments
Leave a Reply. |