You can now see that the tracking feature has been activated on the same wireless card as the new name " wlan0monWhich we will use further for scanning and exploitation. To get started, just type “ airmon-ng start wlan0At the same terminal. Now the next step is to set up your wireless interface to monitor so that it can record / capture packets. So the first step is to connect the wireless USB adapter to our Kali Linux virtual machine, which you can easily control by typing “ iwconfigAt your terminal.Īs you can see by running the command " iwconfig", A wireless interface is displayed with the name" wlan0This means that the USB wireless adapter is connected and working. These attacks enable the ability to decrypt / encrypt traffic, but do not allow the attacker to fully connect to the network as a regular user.īelow we will show you a simple brute force attack with the help of the Aircrack tool that is already installed on all versions of Kali Linux.
![wpa2 wordlist kali wpa2 wordlist kali](https://cdn.darknet.org.uk/wp-content/uploads/2010/09/wifite-Mass-Wifi-WEP-WPA-Key-Cracking-Tool.png)
WPA attacks can be divided into two categories:Īttacks against authentication are the most common and have direct access to the wireless network.ĭuring the WPA-PSK authentication attack, the attacker also has the ability to decrypt / encrypt the traffic from the PMK recovery.Įncryption attacks ( attacks against encryption) appear only on WPA networks. However, the extra protection comes to increase the complexity of the protocol.Īlthough WPA was developed with security in mind, it has its drawbacks that we can take advantage of. WPA / WPA2 greatly improves the security of wireless networks.