Professional Documents
Culture Documents
Summer Training PPT 11909002
Summer Training PPT 11909002
&
Ethical hacking
INTRODUCTION
The term cyber security is used to refer to the
security offered through on-line services to protect
your online information.
Wireless Security Protocols such as Wired Equivalent Privacy (WEP) and Wi-
Fi Protected Access (WPA) is the authentication security protocols created by
the Wireless Alliance used to ensure wireless security. There are four wireless
security protocols currently available.
To be sure your network is secure, you must first identify which network
yours falls under.
Step 1: Open terminal and type ifconfig to check the
wireless interface is available on your machine.
Step 2: Nmap is in managed mode. Change it to the
monitor mode by using the airmon-ng tool.
Step 3: After that we will use airodump-ng wlan0mon
to start scanning for all available networks.
Step 4: Select any of the available access points from
the list then use airodump-ng to capture the handshake
details in a file.
Step 5: Now, DE authenticate the connected device from the
target device using aireplay-ng.
Step 6: The handshake details are stored in the .cap file.
Step 7: Finally, by using aircrack-ng, you can find the
passphrase. It may take too long if the password is more
complicated.
LEARNING OUTCOMES