In this video, learn how to use Wifite to deauthenticate a client, capture a reauthentication handshake, and how to run a brute force attack the WPS PIN. Finish off by learning how to do a PIN connect to recover the WPA key.
- [Instructor] We've seen a number of WPA and WPA2 networks … during our monitoring. … So now it's time to see how well they're protected … by extracting data from them, … which might lead us to the network password. … We've look at WiFite previously for extracting web passwords … and I'll use it again for extracting the WPA handshake. … WiFite sends client deauthentication requests … to force a reauthentication handshake, … which can be captured and subsequently analyzed. … I'll instruct WiFite to give me a random MAC address … and to verify the handshake using Aircrack. … WiFite starts scanning for networks, … displaying a list of all the networks it finds … and on the right, shows active clients, … devices associated with those access points. … I'll let WiFite run for a few moments … to capture multiple clients on my TPG-83NJ network. … Okay, I can now press Control + C and select the target. … WiFite starts with a couple of WPS attacks. … I can press Control + C to skip over these …
Note: This course is part of our test prep series for the Certified Ethical Hacker exam. Review the complete exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Selecting an antenna
- Configuring security
- Extracting WEP and network passwords
- Testing passwords
- Harvesting connections from rogue access points
- Attacking networks via Bluetooth
- Capturing wireless packets with Acrylic Wi-Fi
- Heat mapping with Ekahau
- Wi-Fi sniffing with Wireshark
- Testing the Internet of Things