Learn how to use Wifite to deauthenticate a client, capture a reauthentication handshake, brute force attack the WPS PIN, and then do a PIN conenct to recover the WPA key.
- [Instructor] We've seen a number of WPA and WPA2 networks…during our monitoring,…so now it's time to see how well that's detected…by extracting data from them…which might lead us to the network password.…We've looked at Wi-Fi previously…for extracting web passwords,…and I'll use it again for extracting the WPA handshake.…Wi-Fi sends client deauthentication requests…to force a reauthentication handshake…which can be captured and subsequently analyzed.…
I will search Wi-Fi to give me a random MAC address…and to verify the handshake using Aircrack.…Wi-Fi starts scanning for networks,…displaying a list of all the networks it finds,…and on the right shows active clients,…devices associated with those access points.…I'll let Wi-Fi run for a few moments…to capture multiple clients on my TPG83MJ network.…OK, I can now press Control-C and select the target.…
Wi-Fi starts with a couple of WPS attacks.…I can press Control-C to skip over these,…as I want to get into the WPA attacks.…Wi-Fi has run an active WPA attack…on the affected network,…
Note: This course is part of our test prep series for the Certified Ethical Hacker exam. Review the complete exam objectives at https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/.
- Selecting an antenna
- Configuring security
- Extracting WEP and network passwords
- Testing passwords
- Harvesting connections from rogue access points
- Attacking networks via Bluetooth
- Capturing wireless packets with Acrylic WiFi
- Heat mapping with Ekahau
- Wi-Fi sniffing with Wireshark
- Testing the Internet of Things