(of a network, not router's).
using aircrack-ng tool suite, for example.
we need also a computer with wireless network card that can go into 'monitor mode'.
this tutorial shows how, with kali linux pc (Paco):
first we turn on network card's monitor mode.

then we start 'sniffing' for data with airodump-ng tool.


we have to provide a dictionary file, either script-generated or downloaded.
if we want to use letter/digit/word/syllable combinations or something similar, we have to prepare dictionary properly, for example with a script.
this time i've provided modest three-word dictionary by typing it in Linux's vi editor.
i didn't see a Linux version without this editor as of yet.

then we can use aircrack-ng command to attack password.
command below attacks password protected by WPA standard, using dictionary method.
for more, reader should consult linux man pages or a proper course, perhaps more.


data 'sniffed' can be also decrypted with airdecap-ng tool, for example.
see also, if You wish: Wireless Network Cards with Linux.
No comments:
Post a Comment