12.8. Cracking WPA-PSK

Of the wireless encryption protocols, WPA is one of the hardest to hack. Let's explore a way to do it. For this we will use two open source security tools, Airforge and Aircrack.

Once a target network using a WPA access point has been identified, using a tool such as KisMAC, you can begin to launch the attack using Airforge to create a deauthentication packet (assuming the current working directory contains the airforge binary).

./airforge <MACaddressofap> <MACofclient> filename.cap

What Airforge will do is cause a user connected to the WAP to become deauthenticated from the network. Once disconnected, the deauthenticated user's system will attempt to reauthenticate, and the SSID will be sent over the air in plain text. ...

Get Enterprise Mac Security: Mac OS X Snow Leopard now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.