can have different chipsets • Ex: Rev1 may have Atheros chipset, Rev2 may have a TI chipset • Best to do research before just buying any wireless NIC Wireless NICs
raw 802.11 frames • Collects WEP weak IVs (Initialization Vector) • With a GPS receiver, can log coordinates of found APs • Example usage: • airodump-ng <options><interface name> Airodump-ng
mangling rules to reflect the additional digits at the end of the password. Edit /etc/john/john.conf and add $[0-9]$[0-9]$[0-9] in the [List.Rules:WordList] section. Step 4 – continued
the Wi-Fi standard itself. • The adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying cryptographic handshake messages. • Patch all the things! KRACK - Key Reinstallation Attack Source: https://dribbble.com/shots/2594100-Kraken
lab. Once packet injection is done, the whole process becomes illegal. • 2) It can be very fun! But can also be frustrating when trying to get everything to work. • 3) If things aren’t working right, try separating the wireless devices. The closer they are, the more issues can happen. All my devices were just over a metre of each other.