As we follow steps in section 3 to attempt attacks, it
found that WLAN that used WPA2-PSK security is
vulnerable to aircrack-ng. In our experiment, we need
about nine minutes to break the password. We used
aircrack-ng with airodump-ng and aireplay-ng. In this
case we have to waiting for the client to perform
authentication, WPA Handshake then the process would
be easily captured by airodump-ng, then we performed
Dictionary Attack using aircrack-ng. We can also use
Aireply-ng to push client to do re-authentication.
The results of evaluating the proposed technique for
SSID internal used the procedure as shown in section 3.2.
First, the experiment showed that the laptop that
listed in active directory but does not have digital
certificate could not join the WLAN. The NPS server
rejected the requesting connection.
Second, the results of attacking test used the same
tools in section 3.2: airodump-ng, aireplay-ng, and
aircrack-ng as follow: Airodump-ng still can detect the
internal SSID and other WLAN in the range. Aireplay-ng
successfully do inject by sending the injection packet that
cause the client has to do re-authentication. When client
doing re-authentication, the Airodump-ng still can
capture WPA handshake and save it in wpa2ent.cap.
After we try to break this file for more than one hour we