<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Aircrack-Ng on Chief Dennis' Blog</title><link>https://chiefdennis.github.io/tags/aircrack-ng/</link><description>Recent content in Aircrack-Ng on Chief Dennis' Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Sun, 01 Jun 2025 15:43:16 +0100</lastBuildDate><atom:link href="https://chiefdennis.github.io/tags/aircrack-ng/index.xml" rel="self" type="application/rss+xml"/><item><title> WPA/WPA2 Protocol: Packet format analysis and attacks against it</title><link>https://chiefdennis.github.io/projects/wpa_protocol_attacks/</link><pubDate>Sun, 01 Jun 2025 15:43:16 +0100</pubDate><guid>https://chiefdennis.github.io/projects/wpa_protocol_attacks/</guid><description>&lt;p>&lt;img src="https://chiefdennis.github.io/projects/wpa_protocol_attacks/image1.png" alt="">&lt;/p>
&lt;h2 id="identification-of-the-different-types-of-wpa-protocol-packets">
 Identification of the different types of WPA protocol packets.
 &lt;a class="heading-link" href="#identification-of-the-different-types-of-wpa-protocol-packets">
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading">&lt;/i>
 &lt;span class="sr-only">Link to heading&lt;/span>
 &lt;/a>
&lt;/h2>
&lt;p>In this first phase, the analysis of a traffic capture corresponding to a WiFi network with WPA2-PSK authentication has been carried out. The tool used has been Wireshark, due to its ability to interpret and decompose network protocols in a detailed way. The purpose of this point is to identify the different types of packets involved in the WPA2 connection and authentication process, as well as to examine the most relevant fields of each and understand their function within the overall context of the capture.&lt;/p></description></item></channel></rss>