A "handshake" is needed to be captured in order to crack WPA. A handshake occurs when a client connects to an access point for the first time. i.e. when they turn their computer on and the computer autoconnects to the network a handshake packet occurs.
There are only 2 ways to crack this, either by a dictionary attack using :
aircrack-ng -a 2 -w dictionaryfile capturefile Or by brute force which requires an app like JohnTheRipper.For these reasons, WPA is very secure given one uses a non-dictionary password.
-adese On 14 aug 2007, at 19.59, Javier Bonet wrote:
What is required to crack WPA WLANs? what does the --WPA comands in aircrack-ng. J