In this video, learn how to use Wifite to intercept initialization vectors, including IVs0, and crack them to recover the WEP password.
- [Narrator] A typical attack on web involves three steps. … Firstly, establishing a monitoring interface, … then using a tool such as Aireplay-ng … to perform fake authentication … and collect the initialization vectors. … And finally, running Cain or Aircrack-ng … to extract the encryption key … from the initialization vectors. … These capabilities have been bundled … into a tool called Wifite. … So we'll use that, … I plugged in my alpha USB wireless adaptor … and configured it through to Kali. … If you aren't sure how to do this, … check out the wireless section … of my introduction to Kali course. … Okay, I've got a terminal window open, … so I'll run Wifite to automate the attack. … I'll use two command line parameters, … dash + dash + mac to indicate … that I want a random mac address … and dash + dash + aircrack to tell Wifite … to verify the handshake using Aircrack. … We can see the networks that Wifite has detected, … and it will keep monitoring until we tell it … to move on to its next phase. …
Note: This course is part of our test prep series for the Certified Ethical Hacker exam. Review the complete exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Selecting an antenna
- Configuring security
- Extracting WEP and network passwords
- Testing passwords
- Harvesting connections from rogue access points
- Attacking networks via Bluetooth
- Capturing wireless packets with Acrylic Wi-Fi
- Heat mapping with Ekahau
- Wi-Fi sniffing with Wireshark
- Testing the Internet of Things