Time for action – connecting to a WPA network

We can proceed with the following steps:

  1. In the case of WPA, the matter is a bit more complicated. The iwconfig utility cannot be used with WPA/WPA2 Personal and Enterprise, as it does not support it. We will use a new tool called wpa_supplicant for this lab. To use WPA_supplicant for a network, we will need to create a configuration file, as shown in the following screenshot. We will name this file wpa-supp.conf:
    Time for action – connecting to a WPA network
  2. We will then invoke the wpa_supplicant utility with the following command:
    wpa_supplicant -D wext -i wlan0 -c wpa-supp.conf
    
  3. This will connect the device to the WPA network we just cracked. Once the connection is successful, wpa_supplicant will give you the message: Connection to XXXX completed.
  4. For both the WEP and WPA networks, once you are connected, you can use dhclient to grab a DHCP address from the network by typing dhclient3 wlan0.

What just happened?

The default Wi-Fi utility iwconfig cannot be used to connect to WPA/WPA2 networks. The de-facto tool for this is wpa_supplicant. In this lab, we saw how we can use it to connect to a WPA network.

Pop quiz – WLAN encryption flaws

Q1. What packets are used for packet replay?

  1. Deauthentication packet
  2. Associated packet
  3. Encrypted ARP packet
  4. None of the above

Q2. When can WEP be cracked?

  1. Always
  2. Only if a weak key/passphrase is chosen
  3. Under special circumstances only
  4. Only if the access point runs old software
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.17.167.114