![]() MAC address of wireless client using WPA/WPA2īSSID (MAC address of victim access point) MAC address of machine running aircrack-ng suite If you want to learn more about the inner workings of aicrack-ng's WPA/WPA2 PSK cracking, you can read more on the section about Password Cracking.īefore we get down to the nitty-gritty, there is some information that has to be known to be able to "get cracking". You will only need a few specific programs and options for cracking WPA/WPA2 PSK, which are explained in the following sections. Just type sudo aircrack-ng in the shell to get an overview of available options. On the image that was used (Kali Linux 2020.4 64bit for VMware by Offensive Security), the aicrack-ng program suite is already preinstalled. If you want to install aircrack-ng from source, click here to access the official documentation. The used client software was VMware Workstation Pro 16.1.0 build-17198959 and the used host system was Windows 10 Home Edition (64 bit). Results are based on tests that were run on the Kali Linux custom image for VMware (Kali Linux 2020.4 64bit) wich is maintained and provided by Offensive Security. The guide is meant for usage on *NIX systems capable of installing and running aircrack-ng. This documentation is a step-by-step guide explaining how to use the aircrack-ng program suite to crack passwords of Wireless Access Points using WPA or WPA2.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |