KisMAC Video Tutorial

KisMac Video Tutorial In HD
Airport Extreme Passive Mode,  WEP / WPA with or without Re-Injection, WPA Deauthentication, Flood Attack.

Do NOT buy any Network Adapter before reading the reviews, you'll pay too much for too less... 




General Troubleshooting Note: 

For the USA , only select channels 1 to 11 (FCC channels)
For the General Europe , only select channels 1 to 13
For Japan Only: Channel 1 to 14

Before attempting an audit of the key, please be sure to have collected enough IV's (Initialization Vectors)
Look at the number of Data Packet. If the number stays flat, the network has no or very little traffic: You'll need patience

Return to the main KisMAC post

Return to Troubleshooting KisMAC

4 comments:

  1. if we dont have usb n wanted to do so via airport for WPA cracking, there is no such option to use it as primary device.. so whats the conclusion for that?

    ReplyDelete
  2. use passive mode. You will need to capture the handshakes. Without a card able to work in active mode (re-injection, etc) you will need an extreme amount of patience.

    ReplyDelete
  3. What does "deauthentication will reveal your attack'? Does that mean the owner of the WPA network will somehow be made away that you're attempting a crack? Thanks!

    ReplyDelete
  4. Yes/No
    Deauth will un-hide cloaked network(s), but while doing you, it sends frames, that can be detected by the victim. As soon as you leave the comfort of passive monitoring, you can become visible.
    The same as when you listen to a conversation and when you try to participate to it.

    ReplyDelete