Download WirelessCapture4.cap into your attack system. How many IVs are in the packet capture?

Lab 6.1:  Wireless Exploitation           

Objectives:

  • Explain and exploit the vulnerabilities of WEP
  • Explain and exploit the vulnerabilities of WPA

Virtual Machines Needed:
Attack System:  Kali – NAT networking
File Needed:  WirelessCapture4.cap & WirelessCapture5.cap

  1. Download WirelessCapture4.cap into your attack system.

  2. How many IVs are in the packet capture?
  • What is the WEP key? 
  • Insert a screenshot showing you successfully “cracked” the WEP key.  Include Nazaire Biscoe  somewhere in the screenshot. 

[INSERT SCREENSHOT]

  • Insert a Wireshark screenshot showing you successfully decrypted the wireless traffic.  Your screenshot must show (at minimum) 15 frames. 

[INSERT SCREENSHOT]

  • Download WirelessCapture5.cap into your attack system.

  • What is the ESSID of the Wireless network?
  • What is the password for the wireless network?

  • Insert a screenshot showing you successfully “cracked” the WPA key.  Include Nazaire Biscoe somewhere in the screenshot.

[INSERT SCREENSHOT]

  1. Insert a Wireshark screenshot showing you successfully decrypted the wireless traffic.  Your screenshot must show (at minimum) 15 frames. 

[INSERT SCREENSHOT]

0 thoughts on “Download WirelessCapture4.cap into your attack system. How many IVs are in the packet capture?

Leave a Reply

Your email address will not be published.

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>