Learn about using Wifite to intercept initialization vectors (IVs0) and crack them to recover the WEP password.
- [Instructor] A typical attack on WEP involves three steps.…Firstly, establishing a monitoring interface.…Then using a tool such as Air Replay NG to perform…fake authentication and collect the initialization vectors.…And finally, running Cain or Aircrack-NG to…extract the encryption key from the initialization vectors.…These capabilities have been bundled…into a tool called Wifite.…So we'll use that.…I plugged in my Alpha USB wireless adapter and configured it…it through to Kali. If you aren't sure how to do this…check out the wireless section…of my introduction to Kali course.…
Okay, I've got a terminal window open,…so I'll run wifite to automate the attack.…I'll use two command line parameters,…"--mac" to inidicate that I want a random MAC address…and "--aircrack" to tell Wifite to verify that handshake…using aircrack.…We can see the networks that Wifite has detected…and it will keep monitoring until we tell it to move…on to its next phase. I can see my WEP access point…which is called "TP-LINK_96E8A0", so lets select that.…
Note: This course is part of our test prep series for the Certified Ethical Hacker exam. Review the complete exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Selecting an antenna
- Configuring security
- Extracting WEP and network passwords
- Testing passwords
- Harvesting connections from rogue access points
- Attacking networks via Bluetooth
- Capturing wireless packets with Acrylic WiFi
- Heat mapping with Ekahau
- Wi-Fi sniffing with Wireshark
- Testing the Internet of Things