Description: You will see in this video about how an attacker can get the WPA Handshake without sending any deauthentication packet.
Tags: WPA Handshake , Wireless Hacking ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
So this method doesn't require a client be connected? I saw no associated clients on your airodump, but I did see an unassociated one. Does a client with access have to be within range?
i think you didn't get the point here.
what i did here was,
i created a fake AP. Without deauthenticating the clients, the clients got connected to me because of my high signal strength.
when the clients got connected to my fake AP, i got the WPA handshake.
So i don't think that you even have to see the "airodump". you'll see the connected client in "airbase" only.
I like that you thought of an alternate method, but maybe I am missing the point. Isn't this unnecessarily more complicated than simply deauthing a client? I mean, suppose you don't have significantly greater signal strength? Wouldn't you have to send a stream of deauths spoofed from the routers bssid anyway, just to assure that they connect to your fake airbase network? This is how I've managed some MITM attacks when I don't have as good signal strength. I mean, it's pretty rare for me to have greater signal strength from outside than a potential victim's router inside the house with them. I'm not trying to be a pain, but I just don't see the practicality other than having an alternate method from the norm, which is always good.
Sweet background, btw :)
yes bro i can understand but its just an alternative method. :D
am not forcing you or anybody to use this method, i just want to show that there's an alternate way to do the same thing :D :D
n thanks for the comp :D :D