Attack WEP
Last updated
Last updated
Ref:
Start Monitor mode:
Start capture hash of the handshake:
In parallel run deauthentication attack:
crack the handshake
After cracking, you can directly connect the WiFi by the UI or terminal below:
Stuck?
--> https://securitysynapse.blogspot.com/2013/12/wireless-pentesting-on-cheap-kali-tl.html