Cracking WPA2 Tutorial

June 17, 2011 by Andrew Whitaker

In this video we will demonstrate how to crack WPA2 using the Airmon-ng suite. We will do it by:

  • Identifying an access point
  • Capturing traffic from that access point
  • Attempt to capture the handshake. We have two options for doing this.
    1. We can wait for a client to connect on their own
    2. We can run a deauth attack to force them to disconnect and then you can capture the handshake then

Once you have captured the handshake, you can attempt to crack it with a word list or a rainbow table. The key can then be found from there.


Posted: June 17, 2011
Andrew Whitaker
View Profile

Andrew Whitaker is a Senior Instructor for both the InfoSec Institute and the Intense School. He is also a nationally recognized expert on information security. He has performed penetration tests on numerous financial institutions throughout the United States and has been a regular consultant to government agencies on cyber security.He is also the author of several best-selling security and networking books, including "Penetration Testing and Network Defense" (Cisco Press), "Cisco Router Configuration Handbook" (Cisco Press), and "Chained Exploits: Advanced Hacking Attacks From Start to Finish" (Addison-Wesley). He is also a frequent conference speaker and has given talks on ethical hacking at Defcon, Chicagocon, SecurePhilly, and TakeDownCon. Whitaker also holds a Master’s Degree in Computer Science. He has trained the military, government defense contractors, and intelligence agencies on cyber security, risk management, ethical hacking, reverse engineering and exploit development.