WiFi-password cracking using kali linux
How do Wi-Fi hacking works?
This technique functions in the following way:
- 1. Primarily, we will be going to discover targeted Wi-Fi (Access Point) through monitoring the Wi-Fi signals.
- 2. Then, it is essential on our part to send de-authentication packets to the AP which will compel the clients connected to the access point to obtain disconnect from the AP.
- 3. When the client will attempt to reconnect to the AP, we will grab the 4-way handshake file which comprises the password in encrypted form.
- 4. After that, to get the password, we will be going to use aircrack-ng to crack the handshake file
2. Put your Wi-Fi adaptor into monitor mode
You are required to know first the name of your Wi-Fi adaptor before putting your Wi-Fi into monitor mode and for that type in the following command in the terminal.
I am going to perform all the following commands on this adaptor as you can see, I have a single Wi-Fi adaptor(wlan0).
Now to put this adaptor into monitor mode type the subsequent command in the terminal
While your Wi-Fi is in monitor mode, notice that you can’t use your internet. And my adeptor name is changed from wlan0 to wlan0mon.
We are required to kill background processes, before we start monitoring Wi-Fi signals. So that they will not be able to interrupt while we are working in monitoring mode, for that type following command in the terminal windows.
You can start monitoring the Wi-Fi signals near you, after putting your Wi-Fi into monitor mode.
3. Start monitoring Wi-Fi signals
We are going to use airodump-ng command to start monitoring Wi-Fi signals. Just type the subsequent command in the terminal.
On the upper part of the screen, all the visible access points (APs) are shown and all the clients which are connected to the APs are listed
below.
4. Let’s target the AP you want to hack
If you came across your target in the list of visible APs and at least one client connected to that AP, we can go further else you require to wait for somebody to get connected to that AP first.
Now open up a new terminal window (don’t close the present window) because we required to copy bssid and channel from the current window.
Type the following command in the terminal window.
5. Capture hand-shake
In order to capture the hand-shake which contains the encrypted password, we need to disconnect the connected clients from the AP. For that open new terminal window and type the following command.
This command will send 10 de-authentication packets to the AP which will cause the clients to disconnect from the AP.
And when they will try to reconnect to the AP we will get the file containing the encrypted password. As you can see in the following image we got a message saying “WPA Handshake: BSSID of target” this message means our attack is successful, and we are able to capture the handshake file.
We can find a capture file on the location we specified in the 4th step, in my case it’s root/WPfile-01.cap.
6. Decrypt the password
Now, to decrypt the password present in our file WPfile-01.cap, we need to run the following command against this file using a password list, in my case, I am using a custom password list named PasswordList.txt
How to exit monitoring mode?
Type following command
- How to secure your wireless network from getting hacked?
- 1.Change your default password
- 2.Increase the length of your password (min 12 characters)
- 3.Introduce some symbols and numbers in your password
- 4.Restrict access to your network by permitting only registered MAC addresses
If you want daily hacking tutorial and want to learn ethical hacking then Join our telegram channel and also we are sharing free courses, so don't forget to join here
good to see you
Comments
Post a Comment