While the Targeted Packet Sniffing is still running, we can open a new Terminal window and perform a deauthentication attack. However, what if there was a way we could disconnect clients from our network, and when they reconnect, we capture as many handshake packets as possible. Once the connection is established, we cannot capture any more handshake packets. Handshake packets are only transmitted only when a client connects to a router. SafaricomCapture is the name of the file where we will store the captured packets. # airodump-ng -bssid E4:AB:89:AA:74:1B -channel 12 -write SafaricomCapture wlan1 These are the packets transmitted between the Access Point (Router) and the Client device when establishing a connection. To crack this type of encryption, we will need to capture as many Handshake packets as possible. However, there is a catch! The image above shows that the network uses the WPA2 encryption algorithm-one of the most secure algorithms used in WIFI security. In this tutorial, we will hack the password of the Safaricom Home-2 WIFI network. Now, let's do a targeted packet sniffing and use the captured packets to hack WIFI password. In this step, we sniffed packets, but we did not store them.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |