Wifi Cracking

DISCLAIMER

Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. Cyber Security Associates Limited, will not be held responsible for any criminal charges brought against any individuals misusing the information in these projects to break the law.

Please ensure you are using the latest SD Card image which is available here.

 

Learning Outcomes

  1. Understand how to crack WPA2 WiFi;

  2. Configure a wireless interface to run in monitor mode;

  3. Attempt to crack a target WiFi Access Point (AP).

 

Component Number (Box Case)

Slot 1

Slot 12

Slot 11

Slot 11

Slot 2

Slot 11

Slot 11

Slot 12

Slot 13

Component

Raspberry Pi + Case 

Alfa Card 

USB Cable 

Kali SD Card 

TFT Screen 

HDMI Cable 

Keyboard 

Mouse 

Power Supply Unit 

 

Video Guide

 

Conclusion

In this project we have gone through the steps to crack WiFi passwords. There are a range of ways and tools created to break the WiFi WPA2 protocol and then gain access to the network. During a penetration test this would be completed to gain access to the network that the AP is connected to and exploited to allow persistent connections. If this AP was connected to a network with a file server or a web server it would be a way to access these servers and exploit them for further information. By performing this attack on a Raspberry Pi means this is very mobile and could be hidden at a target location for an extended amount of time, allowing the Raspberry Pi to brute force more complicated passwords as long as it had a power source and could then be a connected attack platform for more attacks.