Using Steam Deck with Kali Linux for Wi-Fi Hacking
"The Steam Deck is a great little device that supports monitoring mode and packet injection, making it
ideal for Wi-Fi network attacks."
• The video showcases the Steam Deck, a popular gaming device, being utilized to run Kali Linux
via a live boot. This approach allows users to perform ethical hacking tasks on various devices,
including the Steam Deck itself.
• The built-in Wi-Fi adapter of the Steam Deck supports crucial features such as monitoring
mode and packet injection, which are essential for attacking Wi-Fi networks.
• The presenter demonstrates how to initiate a Wi-Fi scan by using the terminal command sudo
wifi press a, enabling the system to discover available Wi-Fi networks for potential attacks.
• By connecting a physical keyboard and mouse through a dock, the presenter enhances
usability, allowing for smoother interactions similar to using a conventional computer setup.
Demonstrating Attacks on Wi-Fi Networks
"Always remember to attack networks only that you own or have permission to attack."
• The presenter selects a target Wi-Fi network (a TP Link router) for demonstration purposes and
emphasizes the importance of obtaining permission before conducting any attacks.
• A 'PMKID attack' is initiated, and the presenter captures a handshake by connecting a mobile
phone to the specific Wi-Fi network, which highlights the effectiveness of the processes being
executed.
• The captured handshake is quickly cracked using a weak password, illustrating how vulnerable
poor security practices can be.
Understanding WPA/WPA2 Security
"Even if the Wi-Fi settings display WPA, the network may be using WPA2, which is a stronger
encryption protocol."
• During the demonstration, a common misconception is addressed: that WPA is outdated while
WPA2 is the current standard in Wi-Fi encryption.
• The presenter captures and saves the handshake and performs a sequence of cracking
attempts using Aircrack-ng, providing a live example of how these tools work in practice.
• The ease with which the presenter manages to capture the handshake underscores the risks of
using weak passwords, reminding viewers to implement stronger security measures.