........WARNING......
THIS PAGE IS ONLY FOR AWARENESS AMONG
THE PEOPLES ABOUT THE CYBERS ATTACK
AND HOW TO DEFEND THEM.
HERE EVERY POST NOT TO SPREAD CRIME ON
SOCIETY.
PLEASE DON'T MAKE ANY CRIMINAL
ACTIVITY.
DO IT AT YOUR OWN RISK.THIS PAGE IS NOT
RESPONSIBLE FOR ANY CRIMINAL ACTIVITY.
THANK YOU
WIFI CRACKING IS ALWAYS IN CRAZE FOR EVERY ONE ....
EVERY
ONE WANT AN FREE WIFI NETWORK....
SO
HAVE COME WITH SSOLUTION......
WHAT
ARE THINGS REQUIRED FOR WIFI CRACKING----
1.
KALI LINUX // IT ALSO CAN BE DONE BY OTHER OS
2.
WIFI CARD CAPATIBLE OF MONITOR MODE // i am using currently...
''
NETGEAR N150 WIFI ADAPTER” ON FLIPCARD
RS. 735 ONLY IT SUPPORT ON KALI 1.1.0 //CURRENTLY I AM WORKING ON
IT...
OR
U
CAN USE ANOTHER WIFI CARD....
----use
ALFA AWUS036H
3.AIRCRACK-NG
WHICH CAME ALONG WITH KALI-LINUX
there
are mainly three type of security...
a.WEP
(wiered encypted privacy)
b.WPA(wifi
protected acess)
c.WPA2
---------------CRACKING
WEP NETWORK---------------
actually
in WEP the password is encrypted with string have random charecter
evry time...
called
IV(initial vector)
so
encryption in WEP is like that----
PASSWORD
+IV = ENCRYPTE TEXT
also
in WEP password length are----
PASSWORD
IV ENCRYPTION
40
bit 24 bit 64 bit
104
bit 24 bit 128 bit
so
as u see in both type the IV lenth remain same 24 bit wich
countinoiusly change
in
every second.
SO
THE MAIN WEAKNESS IN THE WEP IS THAT ITS IV LENGTH REMAIN SAME.
So
our main target is to catch the IV'S from that network.
But
how????
STEP
1.
connect
your wifi card to the kali and open up the terminal and type
ifconfig....
check
ur wifi interface in last....mine is wlan0
STEP
2.
type
.....airmon-ng start wlan0 //interface name
this
command used for turn on monitor mode ur wifi card
NOTE-----
without
connecting to them
STEP
3.
type
...
ifconfig
to
check whether monitor mode on or not....
it
will now show another interface name ...mine is mon0
STEP
4
type...
airodump-ng mon0 // new interface name which is in monitor mode
now
this will show all the wifi network in ur area
like
bssid , mac adress ,channel
number
BEFORE
WE GO FHURTHER...WE HAVE TO LEARN SONE BASIC TERMS MEANING......
Information:
BSSID
(Basic Service Set Identification): the MAC address of access point
PWR:
Signal level reported by the card.
Beacons:
Number of announcements packets sent by the AP
#Data:
Number of captured data packets (if WEP, unique IV count), including
data broadcast packets.
#/s:
Number of data packets per second measure over the last 10 seconds.
CH:
Channel number (taken from beacon packets).
MB:
Maximum speed supported by the AP. If MB = 11, it's 802.11b, if MB =
22 it's 802.11b+ and higher rates are 802.11g.
ENC:
Encryption algorithm in use.
CIPHER:
The cipher detected. TKIP is typically used with WPA and CCMP is
typically used with WPA2.
AUTH:
The authentication protocol used.
ESSID:
Shows the wireless network name. The so-called “SSID”, which can
be empty if SSID hiding is activated.
STEP
5
now
to start capturing IV'S.....
type....
airodump-ng
-c (channel number) --bssid (mac adress) -w dump mon0//interface nameBut notice one thing below..it shows some colum name
STATION ..and NAME OF NETWORK..
actually
these are the mac adress of the connected computers in the network
right now.
NOW
SELECT ANY NETWORK HAVING WEP SECURITY ,,AND WRITE DOWN ALL THE
DETAILS....
this
will start capturing IV'S ....wait untill it capture 25000 IV's.
More
number of the IV'S more possibility to crack password .
So
after this its time to crack the password using the captured IV'S
..by dictionary
method.
But,
sometimes due to ....long complex password or due to low traffic
on the victim network...new genration of IV'S is very slow.....
so
cracking WEP can take 5 minute or 5 hours........depend on traffic
on the network....
more
traffic more IV'S generated...so easy to crack the password........
but
u know......hacker quetes......HACKER CAN'T WAIT ........
there
is solution to create traffic on the network.....by aireplay-ng
command......
But
,before check wether ur wifi card...support the arp injection or not
by this command
aireplay-ng
-9 mon0
where
-9 represent the testing of wifi card..
aireplay-ng
-1 -0 -a (mac address) -c (connected computer mac address) mon0 //new interface
-a
---represent the mac addresss of the target
-c------
this is the mac address of the client which is already connected to
the network...
but
how u will gain this mac addresss.......remember while u dump on the
network u will get
another
tabvle name 'STATION' WHICH LIST THE CONNECTED CLIENTS........
type.......
airodump-ng
mon0
tjis
will list all the available network in the area along with it dump
the clients mac addresss ,who are connected currently in thye
network.....
STEP
6.
aircrack-ng
-b (mac adress) dump*.cap
or
aircrack-ng
-k -b (mac adress) dump*.cap // FMS/KOREK technique
both
are the pretty same...use any
BOOM.....U
GOT THE F***ING WIFI PASSWORD..........
AWARE...SECURE..
AND SAFE....UNTIL NEXT BLOG
THIS
IS ZEROCOOL.......sign
out