WiFi Hacking : Catching handshake

Handshake packets are sent every time a client associates with the
target AP. So to capture it we are going to capture every packets that are sent.
In this chapter we are going to use program called “airodump-ng”. This
program lets us to sniff and capture the packets that are sent over the
network. This program is also preinstalled program.

There are two step to catch handshake.

1.Start airodump-ng on the target AP (Access Point):
The syntax is something like this:
>airodump-ng --channel [channel] –bssid [bssid] –write [file-name]
[interface]
Ex: >airodump-ng –channel 6 –bssid 11:22:33:44:55:66 --write out
wlan0mon

2.Wait for a client to connect to the access point, or deauthenticate a
connected client (if any) so that their system will connect back automatically.
The syntax is something like this:
>aireplay-ng --deauth [number of deauth packets] –a [AP] –c [target]
[interfac]
Ex: >aireplay-ng –deauth 1000 –a 11:22:33:44:55:66 –c
00:AA:11:22:33 mon0
If the handshake catched, kali will inform you by top right corner of
airodump-ng will say “WPA handshake”.
Follow these steps and when you will catch handshake your screen
should like this:


When you catch handshake you are ready to actually crack password.

Popular posts from this blog

Activating all versions of Windows Server without a product key

How to Activate Microsoft Office 2010 without Product Key for Free

How to Troubleshoot “connection to KMS server failed” error | KMS Server failed [Solved]