Handshake Theory

“Handshake Theory” WPA encryption uses a unique temporary key to encrypt each packet, unlike WEP where repeated IVs are used, resulting in a large number of data packets with the same IVs. Each WPA packet contains a unique temporary IV, and collecting 1 million packets will not be helpful since they do not provide any information to determine the actual WPA key.

The handshake packets are the only packets that provide useful information and assist in determining the key. These four packets are sent during the four-way handshake process that occurs between a new device and the target network when connecting. Using aircrack-ng, we can use a wordlist to test each password in the wordlist using the captured handshake. To crack a WPA encrypted network, we require the capture of the handshake and a wordlist containing passwords.

We hope that you have found the information on Handshake Theory useful. Stay tuned for more updates on Ethical Hacking by following us daily @ tutorials.freshersnow.com.