How to Hack Wifi using Airodump-ng, Aircrack-ng
?
Hacking Wi-Fi passwords using Airodump-ng, Aircrack-ng
?There are many ways to hack wifi passwords, but here in this article, I will be focusing on cracking it through Airodump-ng and Aircrack-ng.
Disclaimer: I am doing it on my own wireless network, I will not be responsible for your actions if you are doing it on networks that you don't own or if you don't have permission to test it.
Airodump-ng and Aircrack-ng:
Airodump-ng and Aircrack-ng are wireless penetration testing tools that come pre-installed in Kali Linux which is a penetration testing distribution. Airodump-ng is a tool that is used for sniffing wireless networks while Aircrack-ng is a tool that is used for cracking handshakes. There are other tools which are Aireply-ng which we can use for the de-authentication attack.
What is Handshake?
Handshake is a process of authentication of a client connecting to a wireless network. During this process the client and a wireless network exchange information with each other.
Steps to Crack WIFI password through Airodump-ng and Aircrack-ng:
Following are the steps to crack the WIFI password through Airodump-ng and Aircrack-ng.
Kill any running process that interferes with our Monitor mode:
use the following command:
sudo airmon-ng check --kill
Converting our Wireless Adapter mode from Managed Mode to Monitor Mode:
Using the following command
sudo airmon-ng start wlan0
Verifying interface:
Verifying the interface through the following command to check whether it has successfully changed from Managed mode to Monitor mode.
iwconfig
Creating a directory for Storing our Captured Handshake File:
?
Moving to our created folder:
?
Scanning for available wireless networks through Airodump-ng
sudo airodump-ng wlan0mon
Selecting our Target Wireless Network:
?
Pressing Control + C to Stop the Scanning and copying of our target network BSSID and Channel
?
Capturing Handshake of our Target Wireless Network:
?
Command Syntax:
airodump-ng -c 11 -w YourFileNameToSaveToDisk --bssid MACOfTArgetRouter
YourMonitorModeInterfaceName
e.g
airodump-ng -c 11 -w YourFileNameToSaveToDisk --bssid MACAddressOfTargetRouter wlan0mon
?
You can see in the above picture that our target Wireless Handshake is captured.
?
Note:
There is no need to do a de-authentication attack, if anyone connects to your target network, while you have started capturing, then you can easily capture a handshake.
?
If you can't wait long then you can do a de-authentication attack. Let me explain first what de-authentication is.
De-authentication:
It is a type of attack on a wireless access points, in which we are sending de-auth packets.
Steps to do a de-authentication attack:
First, start sniffing for packets on a target access point.
sudo airodump-ng --bssid 5A:AA:C1:DB:A7:CC wlan0mon
You will see different connected devices to your target access point.
Then use the following command to de-authenticate the client.
sudo aireplay-ng -0 30000 -a 5A:AA:C1:DB:A7:CC -c BE:35:6B:0D:1A:7C wlan0mon
Note:
If you have already grabbed the handshake file, then there is no need to do de-auth.
Viewing our Captured Handshake File:
Here you can see our handshake file is captured.
Cracking Handshake through Aircrack-ng:
?
Here we are using the Aircrack-ng tool to crack our captured handshake.
?aircrack-ng -w /usr/share/wordlists/rockyou.txt handshakeThroughAiroDump-02.cap
Password Cracked:
Like comment, share, and follow me for more such type of interesting articles.
Assistant Prof in Cyber Security/ AI & Programme Leader of MSc Artificial Intelligence Tech & MSc Cyber Security Technology at Northumbria University-London Campus, Cyber Security Consultant (PT) at Naztech Inc USA.
10 个月A very good tool to perform wifi hack however, using these tool are not advisable to be used against public ip’s and visible targets ??