A
WiFi

WPA/WPA2-PSK protocol and its hack?

hello world!
I'm trying to figure out the authentication protocol (while writing I felt like a professional) WPA / WPA2-PSK (and you thought ..., because the header is not readable) I want to hack (YET my) access point more specifically. At the moment, with the help of Kali linux and airgeddon, I (aka true hacker) intercepted handshake.cap (only how to read it?) and then I would like to write the password guessing code myself, but I don’t know how.
At the moment, I realized that
PTK = Pre-Shared Key + SSID , Nounce AP and client, MAC address of AP and client,
and so on the idea of ​​handshake.cap (which I can't read) should already contain everything except Pre-Shared Keybut what to do next is not clear.

Answer the question

In order to leave comments, you need to log in

2 answer(s)
I
Ivan Bogachev, 2017-01-26
@sfi0zy

Read the book Kali Linux Wireless Penetration Testing - it says how it works, and what are the popular types of attacks, and, of course, examples with detailed explanations.

C
chupasaurus, 2017-01-26
@chupasaurus

Велосипедить это конечно весело, но лучше почитать исходники crack_wpa_thread() из aircrack-ng

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question