
However, this method is loud and it may get unwilling attention, in case of many deauthentication attempts. As a result, clients must re-authenticate. The active way speed up the whole process as an attacker deauthenticate an existing wireless client (all all clients) in order to obtain handshake.

The passive way can be time consuming as an attacker waits for client to authenticate to WPA/WPA2 network. Handshake can be captured either in passive way, or active way. Our goal is to to capture WPA/WPA2 authentication handshake and use aircrack-ng suite to crack pre-shared key. Therefore, I highly recommend that you use your own devices. Please, be aware that cracking into a network that is not your is illegal. Note: Tutorial is written for demonstration purpose only. However, I strongly recommend getting a background to this topic by studying online resources before experimenting to understand what's going on under the hood. Instead of explaining the theory behind the attack, I focus on providing commands that you can easily copy and paste and penetrate the network.

This tutorial illustrates cracking of pre-shared key which is needed to gain an access to a WPA/WPA2 network.
