WPA/WPA2-PSK
Example of a successful “WEP Crack”
To try to recover a “WPA/WPA2” PSK (=PreShared Key) it is necessary to capture a 4-way Handshake. This handshake will only be done if a Wireless Client connects to a Wireless Network. If this process is passed, the Handshake wouldn’t be send by the Wireless Client anymore (until the next disconnect). To trigger this handshake it is necessary to do an active attack and disconnect a Wireless Client with some de-authentication packages.
Work flow:
Disconnect an established Wireless Client Access Point connection (with de-authentication packages)
Wireless Client tries to reconnect to the Access Point and pass 4-way handshake.
FinIntrusion Kit starts a Wordlist Attack against selected Access Point. On Backtrack exist a password list at the location:
“/pentest/passwords/wordlists/”
WPA Cracking Option Dialog Box
Share with your friends: |