Answer the question
In order to leave comments, you need to log in
WPA/WPA2-PSK protocol and its hack?
hello world!
I'm trying to figure out the authentication protocol (while writing I felt like a professional) WPA / WPA2-PSK (and you thought ..., because the header is not readable) I want to hack (YET my) access point more specifically. At the moment, with the help of Kali linux and airgeddon, I (aka true hacker) intercepted handshake.cap (only how to read it?) and then I would like to write the password guessing code myself, but I don’t know how.
At the moment, I realized that
PTK = Pre-Shared Key + SSID , Nounce AP and client, MAC address of AP and client,
and so on the idea of handshake.cap (which I can't read) should already contain everything except Pre-Shared Keybut what to do next is not clear.
Answer the question
In order to leave comments, you need to log in
Read the book Kali Linux Wireless Penetration Testing - it says how it works, and what are the popular types of attacks, and, of course, examples with detailed explanations.
Велосипедить это конечно весело, но лучше почитать исходники crack_wpa_thread() из aircrack-ng
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question