- Install Wireshark
- Run Wireshark
- Go: View > Wireless Toolbar
- Click on “Decryption Keys…”
- Add a new decryption key. In my instance, because I know the Passphrase, I used WPA-PWD. If you’re doing penetration testing and, you have a 64byte string from something like AirCrack, you should use WPA-PSK.
- Capture away. In the screenshots below, I’ve filtered my own Wi-Fi card to cut down on the volume of ‘junk’ and demonstrate that it is, in fact, decrypting the packets on the WLAN.
Loading
Showing posts with label AirPcap. Show all posts
Showing posts with label AirPcap. Show all posts
Sunday, July 12, 2009
Decrypting WPA with AirPcap in Windows
When AirPcap was first released, only WEP decryption was supported. However, with the release of Wireshark 0.99.5 it is possible to decrypt WPA packets with the AirPcap adapter in Windows. Here’s how:
Tuesday, May 12, 2009
Intro to the AirPcap USB adapter, Wireshark, and using Cain to crack WEP
This video is an introduction to the AirPcap USB adapter, and auditing WiFi networks with it.
Subscribe to:
Posts (Atom)