Breaking WEP and WPA and Decrypting the Traffic

CompTIA Security+ (SY601) Domain:
Domain 1.0: Attacks, Threats, and Vulnerabilities

CompTIA Security+ (SY601) Objective Mapping:
Objective 1.4: Given a scenario, analyze potential indicators associated with network attacks

CEH Domain:
Domain 1: Background
Domain 4: Tools/Systems/Programs
Domain 5: Procedures/Methodology

CEH Objective Mapping:
Objective 1.1 Network and Communication Technologies
Objective 1.3 Information Security Technologies
Objective 4.3 Information Security Tools
Objective 5.2 Information Security Assessment Methodologies
 

Overview

In this lab, you will learn how to exploit flaws in the Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) wireless security protocols using different tools in Kali Linux. 

outcomes:

In this lab, you will learn to:

  1. Decrypt wireless network traffic that uses WEP.
  2. Decrypt wireless network traffic that uses WPA.

Key terms and descriptions

FTP
File Transfer Protocol is a clear text protocol used to transfer files between systems.
TELNET
TELNET is a clear text protocol that is used to remotely administer a machine.
WEP
Wired Equivalent Privacy is a wireless network security standard. A WEP key is a kind of security passcode for Wi-Fi devices.
SSID
Service Set Identifier is a unique identifier attached to the header of packets sent over a wireless local area network (WLAN).
DNS
The Domain Name System converts IP addresses to names and names to IP addresses.