Cracking WPA2 Tutorial

Andrew Whitaker
June 17, 2011 by
Andrew Whitaker

In this video we will demonstrate how to crack WPA2 using the Airmon-ng suite. We will do it by:

  • Identifying an access point
  • Capturing traffic from that access point
  • Attempt to capture the handshake. We have two options for doing this.
    1. We can wait for a client to connect on their own
    2. We can run a deauth attack to force them to disconnect and then you can capture the handshake then

.
Once you have captured the handshake, you can attempt to crack it with a word list or a rainbow table. The key can then be found from there.

ad graphic

Learn Network Forensics

Get hands-on experience analyzing logs, protocols, wireless, web traffic and email for traces left behind by attackers.

ad graphic

Learn Network Forensics

Get hands-on experience analyzing logs, protocols, wireless, web traffic and email for traces left behind by attackers.

ad graphic

Learn ICS/SCADA Security Fundamentals

Build your SCADA security skills with six hands-on courses covering access controls, common cyber threats, process control networks and more.

Enjoy.

Andrew Whitaker
Andrew Whitaker

Andrew Whitaker is a Senior Instructor for both the InfoSec Institute and the Intense School. He is also a nationally recognized expert on information security. He has performed penetration tests on numerous financial institutions throughout the United States and has been a regular consultant to government agencies on cyber security.He is also the author of several best-selling security and networking books, including "Penetration Testing and Network Defense" (Cisco Press), "Cisco Router Configuration Handbook" (Cisco Press), and "Chained Exploits: Advanced Hacking Attacks From Start to Finish" (Addison-Wesley). He is also a frequent conference speaker and has given talks on ethical hacking at Defcon, Chicagocon, SecurePhilly, and TakeDownCon. Whitaker also holds a Master’s Degree in Computer Science. He has trained the military, government defense contractors, and intelligence agencies on cyber security, risk management, ethical hacking, reverse engineering and exploit development.