You may need to add the -ignore-negative-one flag to the command. That command will run indefinitely, continuously disconnecting that client. In the first line of the airodump-ng window, look for a message concerning a handshake to appear at the end of the line. It’ll be harder to see if you had to run -ignore-negative-one because a message about that will occupy the same space, causing the handshake message to flash for a second before being overwritten.Īfter only a couple of minutes, you can safely stop the disconnect requests and the dump. You can stop sooner if you see a handshake message.īrute force attacks run down a wordlist, testing each possibility. So, in order to carry one out, you’ll need a wordlist to test with. If you’re on a different distro, you can find some online, but the best way to get them is from Kali. It’s worth loading a live CD or a VM just to pull them off. On Kali, they’re located in /usr/share/wordlists. The one this guide will cover is rockyou.txt, but you can use any of the ones there. If you really want to be obsessively thorough, you can use Crunch to create your own wordlists. Now that you have your wordlist and your capture, you’re ready to carry out the attack. $ sudo aircrack-ng -w rockyou.txt Documents/logs/wpa-crack-01.cap For this one, you’ll be using the actual aircrack-ng command and passing it the wordlist and the capture. It can take a seriously long time to go through this list, so be patient. If you have a more powerful desktop, there’s nothing wrong with installing Aircrack on it, and transferring both files there.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |