We will set up a WPA-PSK Honeypot with the ESSID Wireless Lab. The
-z 2
option creates a WPA-PSK access point, which uses TKIP:Let's also start
airodump-ng
to capture packets from this network:Now when our roaming client connects to this access point, it starts the handshake but fails to complete it after Message 2, as discussed previously; however, the data required to crack the handshake has been captured.
We run the
airodump-ng
capture file throughaircrack-ng
with the same dictionary file as before; eventually, the passphrase is cracked as before.
Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition
By :
Kali Linux: Wireless Penetration Testing Beginner's Guide, Second Edition
By:
Overview of this book
Table of Contents (19 chapters)
Kali Linux Wireless Penetration Testing Beginner's Guide
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Disclaimer
Preface
Free Chapter
Wireless Lab Setup
WLAN and its Inherent Insecurities
Bypassing WLAN Authentication
WLAN Encryption Flaws
Attacks on the WLAN Infrastructure
Attacking the Client
Advanced WLAN Attacks
Attacking WPA-Enterprise and RADIUS
WLAN Penetration Testing Methodology
WPS and Probes
Pop Quiz Answers
Index
Customer Reviews