Skip to main content

Wireless /Wifi(WEP/WPA/WPA2) Password Cracking Using Dictionary Attack With Aircrack-ng (Kali Linux)


Tools Used:-Aircrack-ng

In the present context of networking, WEP is not used cause it is the weakest and easy to crack through the network. WEP/WPA2 are the most used encryption tools to secure the wireless connection. The most common way of getting past or cracking through WEP and WPA secured wireless connection is through the use of captured handshake. When you want to hack wifi, you need to capture “handshake”. The handshake is the connection of personal computer and wireless network, it is when network packet and personal computer packets meet each other. If you capture handshake then with a handshake you do not need to be in wifi range anymore, you can hack password with handshake and wifi name. Now you need to capture all the packets that are sent through the wifi router and all personal computers in the network.

Step1: airmon-ng 

This step is done before anything else is done in order to know your wifi interface name. Check the running process and  kill all process that is running except network manager

Step2: airmon-ng start wlan0 (wlan0 here is the interface name)

In this step, you start the wlan0 interface.

Step3: airodump -ng wlan0mon(Monitor mode)

In this step, we activate the monitor mode on. This allows us to check all the necessary wireless networks available in your system range. We can see all the necessary details regarding the network including the mac address, channel number, network name, etc.

WPA handshake part in the diagram normally doesn't come at first. It comes or appears once the handshake is captured. Handshake capture part is mentioned in step 5.


Step4: airodump-ng --bssid [Macaddress] -c [Channel number] -w [filename] wlan0


Example:- airodump-ng --bssid 00:25:9C:97:4F:48 -c 6 -w hack wlan0


After file name is given there will be a .cap file in the directory named filename .cap . Once the cap file is captured then we can perform a dictionary-based attack and know the password of the network from anywhere unless the network password is changed.


Step5: aireplay-ng --deauth [number of time deauthentication] -a [bssid] wlan0

With this step de-authentication packets will be sent to the network that will de-authenticate all the devices that are connected to the network and once the device tries to reconnect to the network the handshake is then captured.

aireplay-ng --deauth [number of time deauthentication] -a [bssid] -c [bssid] wlan0


Example:- aireplay-ng --deauth 5 -a 00:25:9C:97:4F:48 -c 00:C5:9C:B7:4F:49 wlan0


-c is used for a specific device that you want to de-authenticate from the network. -c followed by the mac address or bssid of the particular device that you want to de-authenticate.


Step6: aircrack-ng filename.cap -w /root/desktop/rockyou.txt

Rockyou.txt is an inbuilt wordlist that you can find in the following directory:
computer->file system->usr->share->worlists->rockyou.text
Finding the actual key might take a lot of time cause dictionary/word file for cracking the password of a network might be very big with a lot of words. Once the matching key/password will be cracked, it will show as in the picture above.
Some links to download good word list are:-
fist link: http://www.hackreports.com/2013/05/biggest-password-crackingwordlist-with.html 
second link: https://crackstation.net/buy-crackstation-wordlistpassword-cracking-dictionary.html

Comments

  1. Wireless /Wifi(Wep/Wpa/Wpa2) Password Cracking Using Dictionary Attack With Aircrack-Ng (Kali Linux) >>>>> Download Now

    >>>>> Download Full

    Wireless /Wifi(Wep/Wpa/Wpa2) Password Cracking Using Dictionary Attack With Aircrack-Ng (Kali Linux) >>>>> Download LINK

    >>>>> Download Now

    Wireless /Wifi(Wep/Wpa/Wpa2) Password Cracking Using Dictionary Attack With Aircrack-Ng (Kali Linux) >>>>> Download Full

    >>>>> Download LINK yp

    ReplyDelete

Post a Comment

Popular posts from this blog

Making Own Dictionary Using Crunch Commands For Dictionary Attack (Kali linux Tool)

Making own dictionary from words not listed in the normal English dictionary can be helpful specially for people who want to crack passwords based on some person's name, surname or native language words( Example Nepali word, Hindi Word etc). Since most of the word list that are used to hack into a system or crack passwords contain words from English dictionary, passwords such as name of person, surname of person, pet-name and specially words of native language aren't included in that word list as they aren't defined in the English dictionary. This is one the most crucial drawback of dictionary attack. Apart from selective words problem, dictionary attacks usually take lot of time cause they attempt all the words present in the word-list as passwords to crack the authentication system. If we make our own dictionary then it will also help in saving time. But making our own dictionary can only be helpful to only those people who have a hint to what the password might be an...

Windows Registry Analysis For Evidence( Cyber Forensics)

Windows registry analysis is an integral part of generating or gathering evidence against cyber crimes. Every operating system has its own file system and its own registry. The registry is a database of stored configuration information about the users, hardware, and software on a Windows system. Although the registry was designed to configure the system, to do so, it tracks such a plethora of information about the user's activities, the devices connected to system, what software was used and when, etc. All of this can be useful for the forensic investigator in tracking the who, what, where, and when of a forensic investigation.  In Case of windows registry, there are root folders. These root folders are referred to as hives. There are five (5) registry hives. 1. HKEY_USERS: contains all the loaded user profiles 2. HKEYCURRENT_USER : profile of the currently logged-on user 3. HKEYCLASSES_ROOT: configuration information on the application used to open files 4. HK...