Hey,
after doing a lot of reading on this topic and messing with Kali quite a bit I've decided to ask the more experienced guys..
I am running Kali 1.0.9a 64 bit from USB.
My goal is to crack a wifi password obiously. I tried the built in tool (with gui .. can't remember the exact name as I have no reference).
With attacks on WPS (reaver) I always get the 'failed to associate with... ' error.
When I was trying airodump, I even failed to get a handshake. I also tried wifite, which is quite intuitive.. but also didn't have any success.
Is there something I am doing wrong? I can repeat the process and take screenshots of all outputs... without the handshake, I cannot progress in any way.
Also there are few technical things that I was unable to look up.
1. I understand that when the wifi adapter is in monitor (promiscuous) mode, it's able to listen to all the passing traffic. But how is it possible that Kali can
interact (send commands) with the AP? It is not connected in any way.
2. When sending deauth packets, what exactly happens to the clients? Do they get disconnected completely? Wouldn't that make (the slightly more educated ones) suspicious of what's going on? What if the AP that I am attacking doesn't have clients connected?
3. OP mentions that the client's MAC address can be obtained from airodump-ng output.. which one is it? There's a BSSID and a station address
displayed.
4. I completely don't get the way wordlist work. I mean, what is the probability that the AP would have a password from a randomly generated wordlist?
Is it not better to use, let's say crunch to generate all combinations of lower, upper case letters and numbers?
Thanks a lot for help
And sorry for the lengthy post, I wanted to compile it into one post.. this is driving me crazy for the past couple of days and I really want to make some progress.
I am happy to provide any further details if needed.