ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 98 - PT0-003 discussion

Report
Export

A penetration tester is conducting a wireless security assessment for a client with 2.4GHz and 5GHz access points. The tester places a wireless USB dongle in the laptop to start capturing WPA2 handshakes. Which of the following steps should the tester take next?

A.
Enable monitoring mode using Aircrack-ng.
Answers
A.
Enable monitoring mode using Aircrack-ng.
B.
Use Kismet to automatically place the wireless dongle in monitor mode and collect handshakes.
Answers
B.
Use Kismet to automatically place the wireless dongle in monitor mode and collect handshakes.
C.
Run KARMA to break the password.
Answers
C.
Run KARMA to break the password.
D.
Research WiGLE.net for potential nearby client access points.
Answers
D.
Research WiGLE.net for potential nearby client access points.
Suggested answer: A

Explanation:

Enabling monitoring mode on the wireless adapter is the essential step before capturing WPA2 handshakes. Monitoring mode allows the adapter to capture all wireless traffic in its vicinity, which is necessary for capturing handshakes.

Step-by-Step Explanation

Preparation:

Wireless USB Dongle: Ensure the wireless USB dongle is compatible with monitoring mode and packet injection.

Aircrack-ng Suite: Use the Aircrack-ng suite, a popular set of tools for wireless network auditing.

Enable Monitoring Mode:

Command: Use the airmon-ng tool to enable monitoring mode on the wireless interface.

airmon-ng start wlan0

Verify: Check if the interface is in monitoring mode.

iwconfig

Capture WPA2 Handshakes:

Airodump-ng: Use airodump-ng to start capturing traffic and handshakes.

airodump-ng wlan0mon

Reference from Pentesting Literature:

Enabling monitoring mode is a fundamental step in wireless penetration testing, discussed in guides like 'Penetration Testing - A Hands-on Introduction to Hacking'.

HTB write-ups often start with enabling monitoring mode before proceeding with capturing WPA2 handshakes.

Penetration Testing - A Hands-on Introduction to Hacking

HTB Official Writeups

asked 02/10/2024
k Solaimalai Raghu Raman
47 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first