Obtaining WPA/WPA2 keys
This section will walk you through the process of gathering WPA keys using two different methods:
- Social engineering through SSID manipulation and social engineering with fluxion
- Brute force cracking of gathered data using
hashcat
Getting ready
In order to complete this recipe, you will need to follow the commands laid out in the section Scanning for wireless networks and place your wireless network adapter into the monitor mode.
You can confirm this by running the following:
root@kali:~/wireless# iw dev
Confirm that the interface wlan0mon
is set to type monitor
:

How to do it...
There are two ways in order to get the password for WPA protected networks; we will use fluxion in the following way:
- From the command line, ensure that your wireless adapter is in the monitor mode:
root@kali:~/wireless# iw dev phy#0 Interface wlan0 ifindex 4 wdev 0x1 addr 6e:1d:0b:80:36:2b type monitor channel...