4-Way Handshake

Modern days wireless networks and providers follow a 4-way handshake protocol which includes the following steps:

  1. The client device sends a request to the router to allow the connection along with some information about the device and a nonce generated by the device.
  2. Once the router receives the initial request from the client, it also generates a new nonce and sends it along with some WiFi network information and GTK, which is encrypted with the password of the Wi-Fi.
  3. As the client device receives the response from the router, it then decrypts the data packets sent by the router using the password for connecting to Wifi. After decryption, the client device combines the nonce that it generated and the one it got in response from the router hence creating a new PTK. It then encrypts this information using the Wi-Fi password and sends it to the router.
  4. Upon response from the client device, the router decrypts the information using Wifi password and thereby matching the PTK it got from the client and the one which it evaluated. If the PTK matches, then it authenticates the connection request and allows the device to connect to the wireless network.

Now, it is important to understand more about Airodump-ng and Aireplay-ng packages.

Capture Handshake Address with Airodump-ng and Aireplay-ng

In this article, we are going to use Airodump-ng and Aireplay-ng to get the Handshake address passed between the router and the client.

Before starting with the actual process, it is important to first understand how a connection initialization in a WiFi router works and how clients are authenticated to get connected to the router.

Similar Reads

Working on WiFi Authentication and Connection

Typically, connection between a wireless router and client device works as follows:...

4-Way Handshake

Modern days wireless networks and providers follow a 4-way handshake protocol which includes the following steps:...

Airodump-ng

Airodump-ng is a command line tool which is under the suite of Aircrack-ng which is used to assess Wifi network security. This tool is specifically developed and designed to monitoring and intercept the wireless network traffic, including but not limited to Wifi Access points....

Aireplay-ng

Similar to Airodump-ng, Aireply-ng is a command line tool available under Aircrack-ng suite for various purposes like packet injecting network packets, deauthentication attacks and testing vulnerabilities on the network. The tool is valuable for evaluating the security of wireless networks and enhancing penetration testing capabilities....

Approach

Capturing Handshake Address includes various steps to be followed....

Installation

Though, aircrack-ng and all its command line tools come by default, it can be downloaded using the following commands:...

Capturing Handshake Address

Setting up Network Adapter in Monitor Mode...

Frequently Asked Questions:

Q1. Are there alternatives to Airodump-ng and Aireplay-ng for capturing handshake addresses?...

Conclusion:

Capturing the Handshake Address is an essential step in assessing the security of a Wi-Fi network. By using already available tools like Airodump-ng and Aireplay-ng, one can monitor and intercept the Network Authentication process between a client device and a Wi-Fi router to gain information about the network. This information is very important for network administrators, as it can help them identify potential vulnerabilities and weaknesses in the network’s security. But on the other hand, this information can also be used by attackers with malicious intent to break into someone’s private network by exploiting these vulnerabilities....