I've researched online and pretty much everywhere says these should be valid commands to capture a WPA handshake, and the process seems to complete perfectly - with the WPA Handshake: 00:11:22.etc confirmation being shown on my airodump window in the top right. I'm sending deauth packets using this command:Īireplay-ng -deauth 6 -a (targetAP) -c (targetClient) mon0 I'm capturing packets using this command:Īirodump-ng -c 6 -w (outputfile) -bssid (target mac) mon0 So far I've tried a standard aircrack dictionary attack using the darkc0de list but had no success, I'm now trying to use Cowpatty with a handshake packet, but herein lies my current problem. I'm learning the processes of cracking WEP and WPA, I've successfully beaten WEP today (hooray) but WPA seems to be defeating me.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |