Description: In this video, I demonstrate the simplicity of cracking a PSK password using tools freely available within the aircrack-ng suite of tools
I first put my Alfa AWUS036H USB WiFi card into monitor mode and proceeded to listen for WiFi traffic on channel 6 and noted down information
I needed to be able to have airodump-ng running during the next stages so I ran screen and started airodump-ng again to continue my attack
Once I had found an associated client, I created another session and using aireplay-ng I sent a deauthentication packet to this client in the hope that the client would reauthenticate with the target network
Once I had captured the PSK handshake, I stopped airodump-ng and proceeded to crack the PSK using a bruteforce method with the tool aircrack-ng and the example dictionary that comes with the aircrack-ng suite
Tags: wpa , shared key , cracking , wireless cracking ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
will it work on realtek wifi cards?
Take a look here http://www.aircrack-ng.org/doku.php?id=compatibility_drivers
The Alfa AWUS036H uses the r8187 chipset
i think mine is also r8187 too. I cracked wep keys before, but not WAP. will try it soon and post the results here
You just need to be able to send a De-Authentication packet to a client then you just need a large dictionary file.
Alternatively you can use rainbow tables and coWPAtty
i always had trouble in this step. i use BT4 in Vmware, did a lotta search on how to put a dictionary in but in vain.