Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. Cyber Security Associates Limited, will not be held responsible for any criminal charges brought against any individuals misusing the information in these projects to break the law.
Please ensure you are using the latest SD Card image which is available here.
Understand how to crack WPA2 WiFi;
Configure a wireless interface to run in monitor mode;
Attempt to crack a target WiFi Access Point (AP).
Component Number (Box Case)
Raspberry Pi + Case
Kali SD Card
Power Supply Unit
In this project we have gone through the steps to crack WiFi passwords. There are a range of ways and tools created to break the WiFi WPA2 protocol and then gain access to the network. During a penetration test this would be completed to gain access to the network that the AP is connected to and exploited to allow persistent connections. If this AP was connected to a network with a file server or a web server it would be a way to access these servers and exploit them for further information. By performing this attack on a Raspberry Pi means this is very mobile and could be hidden at a target location for an extended amount of time, allowing the Raspberry Pi to brute force more complicated passwords as long as it had a power source and could then be a connected attack platform for more attacks.