so yes im new to kali and my father used backtrack back in his day and now that he knew i am using kali he is telling me to get the wifi password to my internet and yes i dont know that much about kali and i need someone to help me and teach me stuff
so feel free to mention me on this topic and please teach me about kali i really wanna know more about it
from croppy
1 Like
make sure your wifi card or adapter supports monitor and injection, and then learn the burpe suite !! there are plenty of useful tutorials that will get you started with it online. best of luck 
Hey this is terrible advice for many reasons, not the least of which is that burp suite has absolutely nothing at all to do with wifi penetration testing.
@croppy8569 We do not give tutorials on this topic, as we have no way to verify you are telling the truth. Feel free to search online for this though.
5 Likes
About 15 years ago I went with my parents to visit some friends of theirs. I can’t remember what the discussion was about but they asked me to look something up. I had my laptop with me and asked for their Wifi password. They didn’t know it. I fired up airomon and sure enough they were using WEP. One of the friends went to look for the letter from the broadband provider that had the password on it, but it took me less time to crack it with a replay attack, than it took him to find the letter.
That was 15 years ago, and that was with WEP encryption. Today in 2025, pretty much all Wifi routers use WPA3 which has significant improvements over WEP and WPA2.
For example, in WPA2, all devices share the same encryption based on the password, and open networks are not encrypted at all. So, an attacker at a coffee shop could easily read all the Wi-Fi traffic for all connected devices. In WPA3, each session uses a separate encryption key preventing this.
What I am saying to you is, cracking wifi networks with a single laptop in a short amount of time used to be very straightforward back in the Backtrack days. Today it is much more difficult, and requires significant time in research and money in additional resources, and generally relies more on social engineering than in cryptographic attacks. (I dont like social engineering attacks, they are inelegant).
I will echo the first respondant to you, and suggest you sign up for the PortSwigger Academy and get familar with BurpSuite, thereby gaining some useful real world knowledge and experience. Or, join Hack the Box or Try Hack Me, and start flexing your metasploit skills.