As we have already seen in the previous section, if we have the correct passphrase in our dictionary, cracking WPA-Personal will work every time like a charm. So, why don't we just create a large elaborate dictionary of millions of common passwords and phrases people use? This would help us a lot and most of the time, we would end up cracking the passphrase. It all sounds great but we are missing one key component here— the time taken. One of the more CPU and time-consuming calculations is that of the Pre-Shared key using the PSK passphrase and the SSID through the PBKDF2. This function hashes the combination of both over 4,096 times before outputting the 256-bit Pre-Shared key. The next step in cracking involves using this key along with parameters in the four-way handshake and verifying against the MIC in the handshake. This step is computationally inexpensive. Also, the parameters will vary in the handshake every time and hence, this step cannot be precomputed...
Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition
By :
Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition
By:
Overview of this book
Table of Contents (19 chapters)
Kali Linux Wireless Penetration Testing Beginner's Guide
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Disclaimer
Preface
Free Chapter
Wireless Lab Setup
WLAN and its Inherent Insecurities
Bypassing WLAN Authentication
WLAN Encryption Flaws
Attacks on the WLAN Infrastructure
Attacking the Client
Advanced WLAN Attacks
Attacking WPA-Enterprise and RADIUS
WLAN Penetration Testing Methodology
WPS and Probes
Pop Quiz Answers
Index
Customer Reviews