KisMac Video Tutorial In HD
Airport Extreme Passive Mode, WEP / WPA with or without Re-Injection, WPA Deauthentication, Flood Attack.
Do NOT buy any Network Adapter before reading the reviews, you'll pay too much for too less...
General Troubleshooting Note:
For the USA , only select channels 1 to 11 (FCC channels)
For the General Europe , only select channels 1 to 13
For Japan Only: Channel 1 to 14
Before attempting an audit of the key, please be sure to have collected enough IV's (Initialization Vectors)
Look at the number of Data Packet. If the number stays flat, the network has no or very little traffic: You'll need patience
Return to the main KisMAC post
Return to Troubleshooting KisMAC
Subscribe to:
Post Comments (Atom)
if we dont have usb n wanted to do so via airport for WPA cracking, there is no such option to use it as primary device.. so whats the conclusion for that?
ReplyDeleteuse passive mode. You will need to capture the handshakes. Without a card able to work in active mode (re-injection, etc) you will need an extreme amount of patience.
ReplyDeleteWhat does "deauthentication will reveal your attack'? Does that mean the owner of the WPA network will somehow be made away that you're attempting a crack? Thanks!
ReplyDeleteYes/No
ReplyDeleteDeauth will un-hide cloaked network(s), but while doing you, it sends frames, that can be detected by the victim. As soon as you leave the comfort of passive monitoring, you can become visible.
The same as when you listen to a conversation and when you try to participate to it.