Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Experiment on cracking WPA2 encryption package

2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

In wireless security settings, wpa2 is the most widely used encryption authentication method at present. There are no obvious vulnerabilities to exploit in the process of encryption and key management. However, in practice, there are still authentication passwords for wpa2. At present, the most important method for wpa2 is to capture the handshake handshake packet when the user accesses ap. The handshake handshake package contains the encrypted key information. Therefore, when *, you can use the same encryption algorithm to encrypt the contents of the password dictionary and match the contents of the handshake package to find the authentication key of wpa2. The premise of this method is to try to sniff the handshake package and rely on the contents of the dictionary. Therefore, weak passwords are often easily traversed, but for special strong passwords, it is very difficult. This lab does not demonstrate the process of grabbing the package, but only demonstrates the process of dictionary cracking for the known handshake handshake package.

First, use ewsa software to crack wireless data packets

1.1 because of the limited experimental environment, we are unable to grab the handshake package in wifi. For this reason, we have specially prepared a handshake package. Let's take a look at how to crack it if there is a handshake package. First, we open C:\ tools\ to crack the ewsa.exe under the wpa2 encryption package experimental folder.

1.2 Select "Import TCPDUMP file" under "Import data"

1.3After opening, select our cap handshake bag

1.4 after clicking OK, go back to the main program interface.

Select "dictionary options" under "options" on the interface of the main program.

After opening it, select "add" and add our dictionary.

1.7 Select our dictionary, click OK to return to the main page of the program, and click "start attack" to start cracking.

1.8 soon, the software will help us run out the plaintext password.

1.9 at this point, the experiment of cracking the wpa2 encryption package is over.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report