WPA2 PSK
Hacking process
Exploit walkthrough
Monitor mode
iwconfig
airmon-ng check kill
airmon-ng start wlan0 #start monitor mode
iwconfig #verifyDiscover informations
airodump-ng wlan0(mon)
#BSSID is the mac address
#PWR is the distance from the device (less the number is more we are close)
#CH is the channel
#ENC is the type (here WPA2)
#ESSID is the name od the SSID, if its hidden only the length is availableSelect network and capture data
Perform deauth attack
Capture WPA handshake
Attempt to crack the handshake
Last updated