So once you were able to get that was a dictionary attack successful?
On Jun 14, 2006, at 5:50 AM, Erik Winkler wrote:
For WPA dictionary attacks, you need to capture the authentication handshake between a valid client and the access point. I have done this for wireless assessments by sending a deauthentication packet targeted to the specific client BSSID. Once the client disconnects and reconnects to the AP, you have your WPA handshake.
On Jun 14, 2006, at 12:59 AM, Daren wrote:
So what is the min # of data packets before you can start a bruteforce wordlist attack?
PS has anyone successfully been able to break a wpa with a wordlist attack....using Kismac that is.