As we follow steps in section 3 to attempt attacks, it
found that WLAN that used WPA2-PSK security is
vulnerable to aircrack-ng. In our experiment, we need
about nine minutes to break the password. We used
aircrack-ng with airodump-ng and aireplay-ng. In this
case we have to waiting for the client to perform
authentication, WPA Handshake then the process would
be easily captured by airodump-ng, then we performed