In this recipe, we are to see how attackers break WPA2 encryption. WPA Wi-Fi protected access is the successor to WEP encryption after it was realized that WEP encryption failed. In WPA2-PSK we force the victim into multiple authentication handshakes with the wireless router and capture all the traffic as the handshakes contain the pre-shared key. Once we gain a substantial amount of handshakes, we try dictionary-based password guessing against the captured packets to see if we can successfully guess the password. In this recipe, we are going to see how WPA/WPA2 can be cracked.
For this we are going to rely exclusively on the aircrack-ng
suite; since it is pre-built in Kali we don't need to configure much. One other thing we require is a wireless router with WPA/WPA2 encryption. Let us begin.