RE: Not sure what to expect 05-12-2018, 01:47 PM
#3
If you have done so much research I am not sure how to help ?
To crack a WPA2 key you need the handshake, provided by aircrack-ng suite using airodump-ng.
Then you need a LOT of computing power to run an attack against the handshake.
(you could use rainbow tables)
Personally I would l use a phishing attack against an access point to gain WPA2 keys, I have had a 70-80% rate of success
Here are two WiFi Phishers - https://github.com/wifiphisher/wifiphisher or https://github.com/FluxionNetwork/fluxion
For more information on Fluxion http://dieiot.blogspot.co.uk/2017/01/lin...uxion.html
Good luck!
To crack a WPA2 key you need the handshake, provided by aircrack-ng suite using airodump-ng.
Then you need a LOT of computing power to run an attack against the handshake.
(you could use rainbow tables)
Personally I would l use a phishing attack against an access point to gain WPA2 keys, I have had a 70-80% rate of success
Here are two WiFi Phishers - https://github.com/wifiphisher/wifiphisher or https://github.com/FluxionNetwork/fluxion
For more information on Fluxion http://dieiot.blogspot.co.uk/2017/01/lin...uxion.html
Good luck!