how to hack wifi password

5 Steps Wifi Hacking – Cracking WPA2 Password

Today we will learn about 5 Steps Wifi Hacking – Cracking WPA2 Password. A lot of readers send many request regarding how to crack wireless WPA2 password in our request tutorial page.

Requirements:

1. Wireless card (support intermittent mode)

In this tutorial I can use Alpha AWUS036H from Amazon.


5 Steps to Wifi Piracy - Cracking Word WPA2

2. Access point with WPA2 and WS enabled

5 Steps to Wifi Piracy - Cracking WPA2 Password:

1. Open our terminal (Ctrl + Alt + T) and type Irmon-Ng (view tips and tricks how to create a keyboard shortcut on Cali Linux)

5 Steps to Wifi Piracy - Cracking Word WPA2

This command lists our wireless card which is attached with our system.

2. Next step We need to turn off the wireless monitoring mode by running the Irmon-ng stop wlan0

5 Steps to Wifi Piracy - Cracking Word WPA2

3. Now we are ready to pick up the wireless traffic around us. By running IRODOMP-Ng wlan0 our wireless interface will start capturing data.

5 Steps to Wifi Piracy - Cracking Word WPA2

From the picture above, we can see many access points available with all the information. In the green box is the access point of the victim that is my access point 🙂


Information About Wifi Hacking:

Basid (Basic Service Group Definition): The MAC address of the access point

POR: The level of signal reported by the card.

Beacons: The number of ads packages sent by AB

#Data: The number of data packets captured (if Web, unique, and unique), including data transmission packets.

# / S: The number of data packets per second during the last 10 seconds.

Ch: Channel number (taken from Lighthouse packets).

Mb: The maximum speed supported by AB. If the mb = 11, it is 802.11b, if the mp = 22 is 802.11b + and the highest 802.11g rates.

You: The encryption algorithm used.

Sever: Detection of codes. The plug is usually used with WPA and the CAM is usually used with WPA2.

Authent: The authentication protocol used.

Displays the name of the wireless network. The so-called "Ssid", which can be empty if the Sides Hiding is activated.

4. From step 3 above, we can find an access point with the WPA2 encryption algorithm and note the AB channel number. Now you will know whether the target AP has enabled or not.

Washing -i wlan0 -c 8 -C -s

5 Steps to Wifi Piracy - Cracking Word WPA2

If the lock case and the x are not, then we are ready to crack and go to step 5.

5. The last step is cracking the WPA2 password using River.

River -i <your_interface> -b <WY-IN victim of MAC address> -Fail-Wet = 360

Because we already get the information from step 3 above, so it looks like my command like this:

Reaver -i wlan0 -b E0: 05: C5: 5A: 26: 94 -fail-Wet = 360

5 Steps to Wifi Piracy - Cracking Word WPA2

It took about 5 hours to eliminate 19 characters of the WPA2 password (vishnuvalentino.com) from my Cali VirtualBox, but it is compatible with the hardware and wireless card.

CONCLUSIONS:

1. WPA2 and WPA2 security implemented without the use of Wi-Fi Protected feature (WS) is not affected by a security vulnerability.

2. To prevent this attack, just turn off the W / Our Measure feature on our access point. See picture below (I only have Chinese version 😛)


Previous
Next Post »
Thanks for your comment