Could someone shine some light on this for me?
I was reading about wireless encryption and vulnerabilities. Say for example I have a home wireless network set up with WPA2 encryption and my password is 1Nibbets!!** Now from what I have read, a common way for someone to break it is to use a dictionary attack like aircrack-ng after sending deauthentication packets and listening/saving ARP requests.
So if the attacker has “Nibblets” in his wordlist but not “1Nibbets!!**” it should fail. Is it possible because the traffic has been saved to a .cap that they could see that “Nibblets” was part of the password and then plug that in for a specific brute force attack to get the numbers and special characters? If I’m totally off on any of this please correct me.
-- Sat Nov 17, 2012 9:58 am --
BAM answered my own question over a year later!