I'm using the Edimax EW-7318 USB stick, using RT73USB drivers, included in Backtrack 4.
I can get data now, but no "4-way handshake", or so it's called with WPA/WPA2 networks.
I ran it for over 50 minutes with over 25,000 beacons, but i guess there is just no one else connecting to the Access Point, which explains it.
I made sure to use the right channel number.
Is there any possible reason why there's no handshake?
( By the way, I was using the cracking_wpa guide from aircrack-ng dot org to help me )
A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.
Apart from that, is there any other possible reason why this isn't working?
The easiest thing to do is get a second laptop and have it join, and then disconnect. Rinse, repeat. You should see at least some 4-way handshakes that way.
Stop the TSA now! Boycott the airlines.
Also, one more question.
I understand the next step is to launch a dictionary brute force attack, which for WPA/2 would be any combination of the ASCII printable characters, with the number of characters ranging between 8-63 characters total.
I was wondering, 1) Presumably these are case-sensitive, and 2) Is a dictionary.lst file simply one word after another, printed one line after another, such as:
OK, that should be about it for my questions.