this article is only for educational purpose n sry for my horrible english hope you dont mind
0x1 set up environment
before we get started , make sure the enough disk space you have
check details:
|
|
if ur installation kali on vmware or something virtual environments , pls prepare a wireless card heres im using rtl8821cu chipset as a tutorial
check ur driver
|
|
install linux-head kernel files
|
|
and find driver on github to install and reboot
|
|
when ur done , so lets switch to root account
|
|
0x2 get into honeypot
when input following command and press tab twice on ur keyboard for tips
|
|
if it supports , the “Monitor” keyword that you should have
|
|
before we scan the wireless you should kill the processes that conflict with airmon-ng
|
|
now get into next step , load monitor mode and ur wifi will go temporarily shutdown
check driver name
|
|
|
|
after u put this command driver name [may] have changed but i dont lol input iwconfig to check again
|
|
now scanning for nearby wifi
|
|
you can see massive details flashing on ur terminal , you only need to remember just several details
as you can see there are two BSSID addresses
|
|
the first one belongs APs and the second is which phone(STATION) is connected to which AP
pick one of ap you want to “connect”
remember its BSSID ,channel(CH) parameters. which device is connected to itself .the device MAC address you need to note also .
if no devices connecting AP’s that you wanna into .we cant crack
start up another terminal with root
when we got device’s MAC address and AP’s BSSID lets start attack
when you typing the following command when gets done it will generate some “cap” files that you just captured where directories are you in.
re-run
|
|
|
|
and waiting to check <WPA handshake> shows on the first one terminal (right top position)
after get cap file then have fun
|
|