The first thing that we did in our experiment is to attack
the network through WLAN with default security setting.
The following is the steps how to do the attack:
1. Identification and monitoring the existing WLAN or
access point using airmon-ng and airodump-ng.
2. After knowing the existence of WLAN, the next action
is to inject data packets to clients that are connected to
the access point using aireplay-ng tool. With the injection
of this package, the client will experience a deauthentication,
so that it will force the client to do reauthentication.
3. In the re-authentication process, airodump-ng will
capture the handshake process and save them into a file.
4. The handshake file has to decrypt using Aircrack-ng
with Dictionary Attack techniques. The expected result is
to know the password used to connect to the Access
Point.
5. In addition to using Dictionary Attack, we also use a
brute force technique. However, this technique took
longer compare to dictionary attack.