OK Diego, sorry I thought you wanted the Router info:
– The adapter is a Realtek RTL8812AU which I purchased from you guys on the zSecurity Shop. As I said, it is running in Monitor Mode.
– No I am NOT running a WEP attack. I am taking this Intermediate Network Hacking course because I have already completed the (prerequisite) beginner’s Learn Ethical Hacking From Scratch course on Udemy. The Intermediate course I am doing now picks up WPA/WPA2 Cracking in Section 5 and beginning of Section 6… and it assumes YOU ALREADY HAVE CAPTURED THE HANDSHAKE in the wpa_handshake.cap file…. Zaid does not show you how to do this because he assumes you have already learned how to do that in the Beginner’s course. The problem is… that I have followed Zaid’s lectures in the beginner’s course on WPA/WPA2 cracing, and Capturing the Handshake (Lessons 22, 27, 28 and 29)…. but I am just not able to capture the handshake and the WPS method doesn’t work on my Router. The wpa_handshake capture file never seems to have any data in it. I showed you the messages displayed in my Kali machine in the screenshots I sent you. this is the WPA/WPA2 (NOT WEP) attack I keep trying without success:
– airodump-ng wlan0
– on upper screen: airodump-ng –bssid <target MAC> –channel <channel #> –write wpa_handshake wlan0
– on lower screen: aireplay-ng –deauth 4 -a <target MAC> -c <connected client MAC> wlan0
and no handshake is ever captured. My network name WiFione and as you can see from the screenshots, the MAC keeps changing… sometimes I can’t find a connected client because the target MAC has now changed.
And Diego… I cannot get ANY CLOSER to the Router…. I am literally 3 feet away from it, it’s sitting right in front of me.
Please help, otherwise I am not going to be able to continue with the course… this is one subject I just can’t skip in order to move forward. Thank you,
Ross