![]() Type "aircrack-ng password-06.cap -w /pentest/wireless/aircrack-ng/test/password.lst" (NOTE: you must type in the most recent password file info) and press enter to search for the password. You are looking for the "password" file you created earlier. This will show you all the file of the directory. This will try to de-authenticate the current user from the network so they will have to re-sign on and re-send their WPA key. In this window type " airplay-ng -0 5 -c (Station MAC) -a (BSSID MAC) wlan0" and press enter. ![]() Now you need to open up a second console window. It will now scan the network and collect info. Copy the MAC address then type "airodump-ng -c (channel) - w (filename) -bssid (MAC address) wlan0" and press enter. You are looking for the one that comes up WPA. This will tell it what wireless card to use and scan for wireless networks. Next, type "airodump-ng wlan0" and press enter. ![]() This does a check to find the wireless guard interface name. In the console you will type "airmon-ng" and press enter. The first step is the boot into Back Track using a VMware Virtual Machine Image. In this video we learn how to crack WPA using Back Track.
0 Comments
Leave a Reply. |