

Similarly, apply for administrator permission. This step, to put it bluntly, is to kick a user off the line and let him reconnect to WiFi, so that we can monitor and intercept the handshake packet It can be seen from this interface that there is one person connected to the selected WiFi, and WiFi without anyone connected cannot be cracked Blasting grab bag These two parameters are the WiFi parameters to be cracked when scanning WiFiĪfter entering, the following interface will be displayed

Two parameters, channel and address, need to be changed. Freedom is the name of the grab handshake package w: Specify the storage location or name of the grab handshake package. You can see that the last name has changed Scan WiFi airodump-ng wlan0monĪfter the above method, press Ctrl + C to exit the scanningĮnter command airodump-ng -w freedom -c 11 -bssid 9C:2E:A1:20:65:BC wlan0mon -ignore-nefative-oneaa You can use the command to see if the name of the network card has changed ifconfig Open a terminal window Enable network card monitoring #Enable network card monitoring If not, please pay attention to whether the network card is connected to the virtual machine, as shown in the following figure

The default root password is Kali #Upgrade permissions The following operations need to be upgraded. Password: Kali Official start View installed network card This paper is based on the support of Kali systemĪfter downloading the VM file, you can directly open it with VMware. Kali is a Linux distribution specially used to penetrate the industry.
#MOST EFFECTIVE WAY TO CRACK WPA2 KALI HOW TO#
How to crack the password of WPA / WPA2 encryption with Kali preparation in advance
