Breaking WEP and WPA and Decrypting the Traffic
CompTIA Security+ (SY601) Domain:
Domain 1.0: Attacks, Threats, and Vulnerabilities
CompTIA Security+ (SY601) Objective Mapping:
Objective 1.4: Given a scenario, analyze potential indicators associated with network attacks
CEH Domain:
Domain 1: Background
Domain 4: Tools/Systems/Programs
Domain 5: Procedures/Methodology
CEH Objective Mapping:
Objective 1.1 Network and Communication Technologies
Objective 1.3 Information Security Technologies
Objective 4.3 Information Security Tools
Objective 5.2 Information Security Assessment Methodologies
Overview
In this lab, you will learn how to exploit flaws in the Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) wireless security protocols using different tools in Kali Linux.
outcomes:
In this lab, you will learn to:
- Decrypt wireless network traffic that uses WEP.
- Decrypt wireless network traffic that uses WPA.