Categories
Uncategorized

Download WirelessCapture4.cap into your attack system. How many IVs are in the packet capture?

Lab 6.1:  Wireless Exploitation           

Objectives:

  • Explain and exploit the vulnerabilities of WEP
  • Explain and exploit the vulnerabilities of WPA

Virtual Machines Needed:
Attack System:  Kali – NAT networking
File Needed:  WirelessCapture4.cap & WirelessCapture5.cap

  1. Download WirelessCapture4.cap into your attack system.

  2. How many IVs are in the packet capture?
  • What is the WEP key? 
  • Insert a screenshot showing you successfully “cracked” the WEP key.  Include Nazaire Biscoe  somewhere in the screenshot. 

[INSERT SCREENSHOT]

  • Insert a Wireshark screenshot showing you successfully decrypted the wireless traffic.  Your screenshot must show (at minimum) 15 frames. 

[INSERT SCREENSHOT]

  • Download WirelessCapture5.cap into your attack system.

  • What is the ESSID of the Wireless network?
  • What is the password for the wireless network?

  • Insert a screenshot showing you successfully “cracked” the WPA key.  Include Nazaire Biscoe somewhere in the screenshot.

[INSERT SCREENSHOT]

  1. Insert a Wireshark screenshot showing you successfully decrypted the wireless traffic.  Your screenshot must show (at minimum) 15 frames. 

[INSERT SCREENSHOT]

Leave a Reply

Your email address will not be published. Required fields are marked *