Penetration Testing
Stealing Wireless Password with fake ap Jul 19 2012 06:22AM
Mat TimeofWheel (matanddie gmail com) (1 replies)
Re: Stealing Wireless Password with fake ap Jul 19 2012 03:57PM
Nathan V (nathan v gmail com)
Hi Mat,

What type of hardware are you using to attempt the capture? Which
software? Knowing a bit more about the details of the setup will
help.

On Thu, Jul 19, 2012 at 10:52 AM, Mat TimeofWheel <matanddie (at) gmail (dot) com [email concealed]> wrote:
> Hi everyone;
>
> I have an interesting (at least for me) question.
>
> ESSID of my real AP is test
> BSSID of my real AP: 1F:X:X:X:X:X
> Password of my real AP: 12345678 (WPA2)
>
> I have created a fake AP with ESSID test and BSSID 1F:X:X:X:X:X
>
>
> 1. From my netbook, i first connected to my real AP and i can capture
> 4-way handshake.
> 2. Then i shut down real AP
> 3. Then i open fake AP
> 4. My netbook connected to fake AP.
>
> However i can not capture 4-way handshake ? I really wonder why ? My fake
> AP is same as real AP. So my netbook should send password to my fake AP ?
>
> Shortly, i'm trying to steal passwords with fake APs and i can not do it.
>
> ------------------------------------------------------------------------

> This list is sponsored by: Information Assurance Certification Review Board
>
> Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT and CEPT certs require a full practical examination in order to become certified.
>
> http://www.iacertification.org
> ------------------------------------------------------------------------

>

--
___________________________
Nathan V

------------------------------------------------------------------------

This list is sponsored by: Information Assurance Certification Review Board

Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT and CEPT certs require a full practical examination in order to become certified.

http://www.iacertification.org
------------------------------------------------------------------------

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus