Hacking

Cracking WPA2 Tutorial

Andrew Whitaker
June 17, 2011 by
Andrew Whitaker

In this video we will demonstrate how to crack WPA2 using the Airmon-ng suite. We will do it by:

  • Identifying an access point
  • Capturing traffic from that access point
  • Attempt to capture the handshake. We have two options for doing this.
    1. We can wait for a client to connect on their own
    2. We can run a deauth attack to force them to disconnect and then you can capture the handshake then

.
Once you have captured the handshake, you can attempt to crack it with a word list or a rainbow table. The key can then be found from there.

FREE role-guided training plans

FREE role-guided training plans

Get 12 cybersecurity training plans — one for each of the most common roles requested by employers.

FREE role-guided training plans

FREE role-guided training plans

Get 12 cybersecurity training plans — one for each of the most common roles requested by employers.

Become a Certified Ethical Hacker, guaranteed!

Become a Certified Ethical Hacker, guaranteed!

Get training from anywhere to earn your Certified Ethical Hacker (CEH) Certification — backed with an Exam Pass Guarantee.

Enjoy.

Andrew Whitaker
Andrew Whitaker

Andrew Whitaker is a Senior Instructor for both the InfoSec Institute and the Intense School. He is also a nationally recognized expert on information security. He has performed penetration tests on numerous financial institutions throughout the United States and has been a regular consultant to government agencies on cyber security.He is also the author of several best-selling security and networking books, including "Penetration Testing and Network Defense" (Cisco Press), "Cisco Router Configuration Handbook" (Cisco Press), and "Chained Exploits: Advanced Hacking Attacks From Start to Finish" (Addison-Wesley). He is also a frequent conference speaker and has given talks on ethical hacking at Defcon, Chicagocon, SecurePhilly, and TakeDownCon. Whitaker also holds a Master’s Degree in Computer Science. He has trained the military, government defense contractors, and intelligence agencies on cyber security, risk management, ethical hacking, reverse engineering and exploit development.