Of course, cracking WEP by bypassing SKA was one the last steps of the course. However, I have another access point that I could use: Dlink-655. I setup the new access point with the same ESSID and the same
Anyway, the only thing left in the lab is cracking WPA networks with the dictionary/custom wordlists. That should be fine. I also want to use a collaboration of cewl, crunch and the wordlists from Backtrack 5 R1 to use in the field. I wonder what kind of results I would get during a security assessment.
Before I forget, if people are having trouble using profile variables to make the commands shorter, I used the ".bashrc" file. The /etc/profile was not working for me like the videos illustrated. I just figured it was my fault since I am using Backtrack 5 R1. Fortunately, I was able to use the variable $ESSID by adding to the file ".bashrc" for example: