If you remember in the previous part, we learned Speeding up WPA2 Cracking Using Pre-generated PMKs. Which certainly uses CPU as the primary part for the calculations of the PMKs. It surely gives us speed for WPA2 cracking as while using PMKs for cracking we are not performing actual calculations in real-time.
If you are following the series from the very beginning you must be familiar with the Handshake we captured and used it with a Wordlist to crack the WPA2-PSK. As there is a tremendous possibility for WPA2 passphrases as they can be AlphaNumeric including special characters that too with 8-63 characters long.
[YB]This article is an excerpt from my WiFi Penetration testing and Security eBook in which I talk about hacking WiFi enabled devices with rogue access points, war driving, custom captive portals and splash page, multiple access points from a single NIC and much more.
WEP (Wired Equivalent Privacy) is the weakest and an outdated encryption mechanism used by the routers(access points) to encrypt data packets passing through the router itself.
As we studied here, WEP uses 64-bit and 128-bit encryption as a standard, but security researchers discovered many flaws in the encryption mechanism of WEP , like static key generation, fast re-keying method.
Introduction to Aircrack-ng Suite of Tools
In Chapter 2, We will cover:
- Introduction to Aircrack-ng Suite of tools
- Introduction to Wireshark
- WEP cracking using Aircrack-ng
- WPA/WPA2 Personal cracking using Aircrack-ng
- WPS cracking
As every topic above is crucial to understand, This chapter will have a dedicated post on each topic.
This is the second chapter of the Rootsh3ll Wireless Security and Pentesting Series. In the previous chapter we covered :
- Installing Kali Linux in VMWare
- Setting up the Wireless card
- Configuring the wireless card
- Installing Kali Linux on a PC
- Removing Kali Linux
Moving on to the second chapter of the series, we will go through the basics of Wi-Fi networks.