[kismac] Re: WPA Data Packets

  • From: Erik Winkler <ewinkler@xxxxxxxxx>
  • To: kismac@xxxxxxxxxxxxx
  • Date: Wed, 14 Jun 2006 08:50:25 -0400

For WPA dictionary attacks, you need to capture the authentication handshake between a valid client and the access point. I have done this for wireless assessments by sending a deauthentication packet targeted to the specific client BSSID. Once the client disconnects and reconnects to the AP, you have your WPA handshake.

Erik

On Jun 14, 2006, at 12:59 AM, Daren wrote:

So what is the min # of data packets before you can start a bruteforce wordlist attack?


Thanks
Daren
PS has anyone successfully been able to break a wpa with a wordlist attack....using Kismac that is.



Other related posts: