githubEdit

WPA2 PSK Hacking Process

Tool: Aircrack-ng suite

Steps:

1) Place = Place wireless card into monitor mode

2) Discover = Discover information about network (Channel, BSSID)

3) Select = Select and capture data

4) Perform = Perform deauth attack

5) Capture = Capture WPA handshake

6) Attempt = Attempt to crack the handshake

Commands:

1)

iwconfig

2)

airmon-ng check kill 

(Kill processes that might interfere)

3)

airmon-ng start WIRELESS_INTERFACE 

(example: wlan0)

4)

(wlan0mon) (Monitor for traffic and search for an access point to target)

5)

(wlan0mon) (Capture the 4-way handshake)

6)

(wlan0mon) (Deauth Attack, NUM means how many times will this attack be performed)

7)

(Crack WPA Handshake)

8)

9)

(Supply the cracked PSK, then connect to the target Wi-Fi)

Last updated