
WPA2 PSK : Home / small business
WPA2 Enterprise : Big companies but difficult to setup
Evaluating strength of PSK, capturing handshake to try to crack password
Reviewing nearby network find where we can network, network that should shows up (printer, iot), rogue network
Guess network segmentation
Checking network access
To efficiently perform wireless pentesting, built-in wifi card isn’t enough, recommended to use external like ALFA Pentesting wireless chipset

<aside> 💸 Buy a chip :/
</aside>
002_WPA_PS2_Exploit_Walkthrough
Check the chip is connected with iwconfig
Set the card to monitor mode
airmon-ng check kill : remove blocking process
airmon-ng start <tool> : start monitoring
Search the area
airodump-ng <tool> : list the accessible wifi
POWER (PWR) : from -1 , close to -inf , far
Channel : look this
Capture handshake
airodump-ng -c <channel> --bssid <bssid> -w capture <filename> : when testing we see connected devices

De-auth attack to capture faster
aireplay-ng -0 1 -a <macaddress of connected>