![]() ![]() It does this by packet capture over the airwaves. ![]() We want to change that to Monitor Mode to scan for local devices trying to connect to local routers. We can see that our interface wlan0 is our listening interface, at the moment it’s in Managed Mode. This will tell you the interfaces that are connected to the internet over a wireless connection. Once you are logged into Kali Linux, open a command shell. Once we do that we will try to crack the password to that WiFi router to gain access. Then we will need to de-authenticate a user from the WiFi connection, this will give us time to capture the re-authentication (the 4 way handshake). So let’s get started, first we need to fire up our Kali Linux machine and get our WiFi card into monitor mode so we can monitor local connections to local routers. ![]() The goal is to gain access to the router.Īs always guys, these posts are for Penetration Testing purposes and not to be used on real networks without permission. Today’s tutorial will be looking into how you can crack the password of the 4 way handshake of someone that is re-authenticating themselves to a wireless router. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |