How to Hack Wifi using Airodump-ng, Aircrack-ng
WIFI Hacking

How to Hack Wifi using Airodump-ng, Aircrack-ng

?

Hacking Wi-Fi passwords using Airodump-ng, Aircrack-ng


?There are many ways to hack wifi passwords, but here in this article, I will be focusing on cracking it through Airodump-ng and Aircrack-ng.


Disclaimer: I am doing it on my own wireless network, I will not be responsible for your actions if you are doing it on networks that you don't own or if you don't have permission to test it.

Airodump-ng and Aircrack-ng:

Airodump-ng and Aircrack-ng are wireless penetration testing tools that come pre-installed in Kali Linux which is a penetration testing distribution. Airodump-ng is a tool that is used for sniffing wireless networks while Aircrack-ng is a tool that is used for cracking handshakes. There are other tools which are Aireply-ng which we can use for the de-authentication attack.


What is Handshake?

Handshake is a process of authentication of a client connecting to a wireless network. During this process the client and a wireless network exchange information with each other.


Steps to Crack WIFI password through Airodump-ng and Aircrack-ng:

Following are the steps to crack the WIFI password through Airodump-ng and Aircrack-ng.

  1. Insert your external wireless adapter that supports Monitor mode
  2. Convert your wireless adapter mode to monitor mode.
  3. After successfully converting your wireless adapter to monitor mode then follow the following steps.


Kill any running process that interferes with our Monitor mode:

use the following command:

sudo airmon-ng check --kill        
Killing any process that interferes with monitor mode


Converting our Wireless Adapter mode from Managed Mode to Monitor Mode:

Using the following command

sudo airmon-ng start wlan0        
Changing wireless adapter mode from Managed Mode to Monitor Mode


Verifying interface:

Verifying the interface through the following command to check whether it has successfully changed from Managed mode to Monitor mode.

iwconfig        
checking wireless interfaces


Creating a directory for Storing our Captured Handshake File:


Creating a directory to store our handshake file

?

Moving to our created folder:


moving to our created directory

?

Scanning for available wireless networks through Airodump-ng

sudo airodump-ng wlan0mon        
Scanning for Available Wireless Networks


Selecting our Target Wireless Network:

Selecting our Target Network

?

Pressing Control + C to Stop the Scanning and copying of our target network BSSID and Channel

?

Capturing Handshake of our Target Wireless Network:

?

Command Syntax:

airodump-ng -c 11 -w YourFileNameToSaveToDisk --bssid  MACOfTArgetRouter

YourMonitorModeInterfaceName        

e.g

airodump-ng -c 11 -w YourFileNameToSaveToDisk --bssid MACAddressOfTargetRouter wlan0mon        

?

Capturing Handshake



You can see in the above picture that our target Wireless Handshake is captured.

?

Note:

There is no need to do a de-authentication attack, if anyone connects to your target network, while you have started capturing, then you can easily capture a handshake.

?

If you can't wait long then you can do a de-authentication attack. Let me explain first what de-authentication is.

De-authentication:

It is a type of attack on a wireless access points, in which we are sending de-auth packets.

Steps to do a de-authentication attack:

First, start sniffing for packets on a target access point.

sudo airodump-ng --bssid 5A:AA:C1:DB:A7:CC wlan0mon        
Sniffing target Access Point

You will see different connected devices to your target access point.

Sniffing Target Access Point Result


Then use the following command to de-authenticate the client.

sudo aireplay-ng -0 30000 -a 5A:AA:C1:DB:A7:CC -c BE:35:6B:0D:1A:7C wlan0mon        
De-authentication

Note:

If you have already grabbed the handshake file, then there is no need to do de-auth.

Viewing our Captured Handshake File:

Viewing our Handshake file


Here you can see our handshake file is captured.

Cracking Handshake through Aircrack-ng:

?

Here we are using the Aircrack-ng tool to crack our captured handshake.

?aircrack-ng -w /usr/share/wordlists/rockyou.txt handshakeThroughAiroDump-02.cap        
Cracking Captured Handshake File part 1
Cracking Captured Handshake File Part 2

Password Cracked:

Wifi Password Cracked


Like comment, share, and follow me for more such type of interesting articles.


Dr. Abdul S.

Assistant Prof in Cyber Security/ AI & Programme Leader of MSc Artificial Intelligence Tech & MSc Cyber Security Technology at Northumbria University-London Campus, Cyber Security Consultant (PT) at Naztech Inc USA.

10 个月

A very good tool to perform wifi hack however, using these tool are not advisable to be used against public ip’s and visible targets ??

要查看或添加评论,请登录

Hazrat U.的更多文章