Cracking WPA/WPA2 – PSK Encryption

Cracking WPA/WPA2 – PSK Encryption

1- Open up a terminal window, type in “ifconfig “. This is going to list all the networking interfaces connected to your device.

IFCONFIG COMMAND

2 - Here, we only need (wlan0) which is our Wi-Fi card, so we can disable the others by doing “ifconfig down”.

ifconfig down

3 -Now, we type “airmon-ng start wlan0”

airmon-ng start wlan0

4 - (airmon-ng is just a tool for monitoring air traffic, “start” basically starts the tool, and “wlan0” specifies the interface we are using for monitoring) It’ll probably show “some processes that could cause trouble”, we’ll simply kill those processes by entering “killing process ID ”.

No alt text provided for this image

5 - Now if we do “ifconfig”, it should show us the newly made monitoring interface “mon0”.

No alt text provided for this image

6 - Then, put in, “airodump-ng mon0”. In the screenshot below, the highlighted bssid is our target (and it is my own), named “Anonymus”, the channel is 13 as we can see under the “CH” column.

No alt text provided for this image

7 - For our next step we type in, “airodump-ng –c -w –bssid mon0”.

No alt text provided for this image

8 - Let me explain a few things here, “airodump-ng” is a tool for capturing Wi-Fi packets, “” means the channel your target is running on, “-w” basically writes a file by the name that succeeds it in “”, (I did “handshake” just for the convenience of it) bssid is a string of numbers specific to a hotspot.

No alt text provided for this image

9 - Now, open up a new terminal and type in “aireply-ng -0 0 –a mon0”, this command send a deauthentication signal (usually called a deauth packet) to all the devices connected to that hotspot. Then after a few seconds we stop it by “Ctrl+C”. Now, as we can see, the other terminal shows that the WPA Handshake was successfully captured.

No alt text provided for this image

10 - We can close both windows at this point, and open a new one. Type “ls”; that should list the files in the current directory. We can clearly see that the files from the above operation are present. But we only need the file ending with “-01.cap”.

No alt text provided for this image

11 - Then we do, “aircrack-ng –w ”< Full location of the wordlist><the file name >

No alt text provided for this image

12 - You may be asking what wordlist? A Wordlist is a file containing thousands of known and possible passwords, which you can download from the internet.

No alt text provided for this image

13 - It will then start searching for matching keys in the word list. Now the time that this will take is solely dependent on the strength of the password. The stronger the password the more time will it take. For very strong passwords, check this out.

No alt text provided for this image



要查看或添加评论,请登录

M. Ouchen的更多文章

社区洞察

其他会员也浏览了