The tutorial we are going to walk through Cracking WPA/WPA2 networks which use pre-shared keys. WPA/WPA2 supports many types of authentication beyond Pre-shared keys.But you have to make share that airodum-ng shows the networks for authentication type of PSK, otherwise don’t try to crack it.
Well, in this tutorials we are going to use some Tools/Equipment which we really need to access and crack WPA/WPA2 Wireless Security system.In order to do this you need Wireless adopter called Alfa Network 1000mW High Power Wireless G 802.11g Wi-Fi USB Adapter with 5dBi Antenna AWUS036H
In order to inject Wireless attack you need to know several terms in networking sense, MAC address 00:0F:B5:88:AC:82 Mac address of wireless client using WPA2 For Example 00:0F:B5:FD:FB:C2 and BSSID know as Mac Address of access point 00:14:6C:7E:40:80 and ESSID know as Wireless network name like (Joe, Jhon etc) most important the interface you have selected for ath0 or Wlan0
Note: if you want to change MAC Address of your windows system you can change through this reliable application easily. TMACv6.0.7
Step 1: Start the wireless interface mode into monitor mode
Basic purpose to put your wireless adopter card into mointor mode that your card can listen every packets in the air. usally your card will onlye “Hear” packets addressed to you. By the hearing of every packets we can later capture WPA/WPA2 handshake.cap file. However it also help us to deauthentication of connected client on our network/router.
In-order to enable monitor mode you need to type following cammand in your linux terminal window
when you put “airmon-ng” in terminal your interface looks like this as mine.
|Type: airmon-ng start wlan0|
In my case i’m using wireless adopter, now you can see it will be in Monitor mode where you are able to send and received authentication or deauthentication packets.
Step 2: Start airodump-ng to collect authentication handshake file.
For the purpose of this to run airodump-ng to capture handshake.cap file with 4 way authentication.
|Type: airodump-ng wlan0mon|
|Type: airodump-ng -c 11 -w /root/MFJ2k19 –bssid 78:4F:57:D1:7E:92 wlan0mon|
|-c||The network channel address|
|-w||The file name prefix for the file which will contain authentication handshake|
|-bssid||The MAC address of the access point|
After this screen appear you need to open another new terminal to initiate another cammand.
|Type: aireplay-ng -0 0 -a 65:4F:37:D1:7E:92 wlan0mon|
Aireplay-ng will send deauthentication packets to Mac address 65:4F:37:D1:7E:92 for the purpose of capture handshake when it will done you can type simple to stop action Crtl+C, as you can see screen shoot handshake file has been capture and it it located into the root directory of linux /root/home.
Step 3: use Aircrack-ng to handshake.cap capture file using Wordlist Attack
Don’t be get consufed if you don’t know how to make wordlist you can make world list in bulk amount mostly are target based and random, like as hacker if you wanted to hack somone you collect somone of his/her most crticial and personal information like his/her password, hobbies, etc
A tool called Crunch tool will help you out to generate wordlist if you really wana know how to do it soon i will upload post regarding this subject.
well comming to the point, now you have to type a command called
|Type: aircrack-ng -w /root/Desktop/faraz.txt /root/Desktop/MFJ2k19-02.cap|
Note: Before do this process copy Hanshake.cap file and wordlist.txt file to desktop as /root/Desktop. otherwise this command will not work.
As you can see i have crack my routher password which is on WPA/WPA2 and wordlist i have generate for this works perfect and found the keys inside it this attacks takes times too if you have wordlist size like 1TB etc its brute forcce attack and number of keys applied in every secend to match exact password in the wordlist file. hope you get this post clearly if you have any question comments section availabe for you.
- PC-Optimization Tools2020.03.15CCleaner Professional 5.50.6911 Free Download
- Ethical-Hacking2020.03.14Top 10 Best Hacking Tools of 2020
- Ethical-Hacking2020.02.18What is Penetration Testing – Introduction
- Cyber-Tech News2020.02.09How to make Online Payments via Debit/Credit Card from Pakistan – Top Best payment Cards in Pakistan