Skip to main content

Wi-Fi Passwords Using Aircrack-ng

In this post I will tell you how to crack wpa/wpa2 wi-fi in kali linux using aircrack-ng. To do this,  first you should install kalinux or you can use live kali linux.

To crack Wi-Fi,  first,  you need a computer with kali linux and a wireless card which supports monitor/injection mode. If your wireless card is not able to do this,  you need to get an external wireless card which is capable of monitor/injection mode.
Apart from these tools,  you need to have a word-list to crack the password from the captured packets.
First you need to understand how Wi-Fi works. Wi-Fi transmits signal in the form of packets in air so we need to capture all the packets in air so we use airodump to dump all the packets in air .After that we should see that if any one is connected to the victim Wi-Fi. If anyone is not connected the Wi-Fi, cracking is not possible as we need a wpa handshake. We can capture handshake by sending deauthentication packets to client connected to Wi-Fi. Aircrack cracks the password.
Step-1:-
First open terminal. We need to know the name of the wireless adapter connected to the computer because computer has many adapters connected.
command for this is iwconfig.
In my case,  my wireless adapter is with the name wlan0. In your case, it may be different.  If connected to an external wireless card, it may be wlan1or2.
Step-2:-
For some wireless cards, it gives error messages to enable monitor mode on wireless cards.  For that, you should use airmon-ng check kill.
  
step-3:-
In this step,  you need to enable the monitor mode on the wireless card. The command is as follows:
airmon-ng start wlan0(interface of wireless card).
Now this command will enable the monitor mode on the wifi card. So while using interface in any terminal or command line use wlan0mon.
Note:You should use the interface which is indicated with red mark.
step-4:-
          We need to use the command airodump-ng wlan0mon, this will display all the access points in your surroundings and also the clients connected to that access points.
Now this command captures the packets in the air. This will gather data from the wireless packets in the air.
Note:Do not close this terminal. This will be used to know wpa has been captured or not.
step-5:-
In this step we will add some parameters to airodump-ng.
command is airodump-ng -c channel –bssid [bssid of wifi] -w [path to write the data of packets]   wlan0mon[interface].
-bssid in my case bssid is indicated with red mark.
 -c channel is the channel of victim wifi in my case it is 10(see in previous screenshot for channel number)
-w It is used to write the captured data to a specified path in my case it is ‘/root/Desktop/hack’.
Interface in my case is wlan0mon.
In the above command the path /root/Desktop/hack  hack is the name of the file to be saved.

Above command displays this terminal.
step-6
In this step we deauthenticate the connected clients to the Wi-Fi.
The command is aireplay-ng –deauth 10 -a [router bssid] interface

In the above command it is optional to give the client mac address it is given by -c
This will disconnects the client from access point.
Screen shot of a client connected to access point.
After this the client tries to connect to the Wi-Fi again. At that time, we will capture the packets which sends from client.  From this result, we will get wpa handshake.

step-7:-
Now we should start cracking the Wi-Fi with captured packets command for this is
aircrack-ng -b [bssid of router] -w [path to word list] [path to capture packets]
       -w path to word list in my case it is ‘/root/Desktop/wordlist.txt’
If you did not have word list, get one. If you want to generate your custom wordlist,  you can visit our other post: How generate word list using crunch.
Now press enter aircrack will start cracking the Wi-Fi.

Aircrack cracked Wi-Fi and key found.

Comments

Popular posts from this blog

Top 20 Tools for hacking 2018

What are Hacking Tools? Hacking Tools are computer programs and scripts that help you find and exploit weaknesses in computer systems, web applications, servers and networks. There is a variety of such tools available on the market. Some of them are open source while others are commercial solution. In this list we highlight the top 20 tools for Ethical Hacking of web applications, servers and networks 1)  Netsparker Netsparker  is an easy to use web application security scanner that can automatically find SQL Injection, XSS and other vulnerabilities in your web applications and web services. It is available as on-premises and SAAS solution. Features Dead accurate vulnerability detection with the unique Proof-Based Scanning Technology. Minimal configuration required. Scanner automatically detects URL rewrite rules, custom 404 error pages. REST API for seamless integration with the SDLC, bug tracking systems etc. Fully scalable solution.

EMBEDDED BACKDOOR WITH IMAGE USING FAKE IMAGE EXPLOITER

In this article we are introducing a newly launched hacking tool “ Fake Image Exploiter ”. It is design so that it becomes easier for attackers to perform phishing or social engineering attacks by generating a fake image with hidden malicious .bat/.exe file inside it. Let’s start! Open the terminal inside your kali Linux and type following command to download it from github. Git clone https://github.com/r00t-3xp10it/FakeImageExploiter.git Once it gets downloaded then opens the folder and selects the file “ settings ” for configuration before running the program as shown the given screenshot. Now made some changes inside setting file as shown the screenshot: Here you have to declare the type of payload extension you will use to hide it inside the image. You can set any exetension among these four : ps1, bat, txt, exe.  I had set  PAYLOAD_EXETNSION=bat  similarly set  BYPASS_RH=NO   and scroll down for next configration. In same way set these two values also as show

Wifi Post Exploitation on Remote PC

Hello readers! Today you will be learning about different ways to get basic service sets information of remote user’s Wi-Fi as well as current network connection information, and how to extract saved Wireless LAN profiles of remote pc after that you will be disconnecting target user’s Wi-Fi too. First Hack the Victim PC Using Metasploit ( tutorial how to hack remote pc ) after that get admin access through Bypassuac ( click here ), once you have victim’s meterpreter session run given below post exploit  one-by-one.  Get BSS information of a remote user’s Wi-Fi connection This module gathers information about the wireless Basic Service Sets available to the victim machine. e.g. this will give you SSID and other important  information regarding wireless connection. msf > use post/windows/wlan/wlan_bss_list msf post( wlan_bss_list ) > set session 5 msf post( wlan_bss_list ) > exploit From given below image you can observe that here it has found “5 networks” suc