What makes the retrieval of the handshake hard is that it appears only when somebody connects to the access point. a handshake (= four-way handshake), or some frames of it (hard).Sniff the channel in monitor mode to retrieve:.Identify the target acces point: name (= BSSID), MAC address (= SSID) and channel (~ radio frequency).Some people say it is expensive, but last time I checked on Google Shopping, it cost less than half an Apple mouse. There is a list on the website of aircrack-ng, and I think the Alfa AWUS051NH v2 is great. So PLEASE, if you want to do other advanced networking things than network sniffing or what is described in this article, do yourself a favour and buy an USB adapter to use with the virtual machine. Most (not airmon-ng) aircrack-ng tools can be installed on macOS with MacPorts, but airodump-ng and aireplay-ng crash.Even if he used Kali Linux with a dual boot, installing the wireless drivers to make it work with the airport card is tiresome.Using advanced wireless features is impossible from a virtual machine.I told him to use the excellent VirtualBox images of Kali Linux from Offensive Security and aircrack-ng. Yesterday, my friend Victor wanted to crack a wifi network (his, of course) using his MacBook Pro.
0 Comments
Leave a Reply. |