A penetration tester is assessing the wireless security of a corporate office. The network is protected by WPA2-Personal. The tester's goal is to passively capture the four-way authentication handshake between a legitimate client and the access point. The captured handshake will then be used for an offline password cracking attempt. Which of the following tools is designed for this specific task?
The Aircrack-ng suite includes tools like airodump-ng, which is specifically designed to capture wireless traffic, including the WPA/WPA2 four-way handshake, for later analysis and cracking. Nmap is a network scanner used for host discovery and port scanning, not for capturing wireless authentication handshakes. WiGLE is a tool for wardriving that maps the geographic locations of wireless access points; it does not capture handshake data. Wi-Fi-Pumpkin is used to create a rogue access point (evil twin) to perform man-in-the-middle attacks, which is an active attack method, not a passive capture of an existing handshake.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the WPA2 four-way handshake?
Open an interactive chat with Bash
How does Aircrack-ng capture and analyze WPA2 handshakes?
Open an interactive chat with Bash
What are the limitations of a passive WPA2 handshake attack?