![]() ![]() We need a dictionary, which is actually just a text file where the passwords we want to try are listed. Now we just have to start a dictionary attack to “guess” the password. This means that we have captured the encrypted password so we can cancel the capturing. aireplay-ng -0 0 -a 98:DE:D0:F9:F8:3B wlan0monĪfter signing in, the WPA handshake will appear on the right in the first window. Let’s run it for a while and pause with Ctrl + C. Run the following command in the second terminal window with target BSSID. Once they are forced to log out, they will automatically log back in. Most devices are automatically logged back to the WIFI network. If we do not want to wait for someone to log in, we can leverage the deauthentication attack on already connected users. airodump-ng -c 13 -w CAPTURE.cap -bssid 98:DE:D0:F9:F8:3B wlan0mon When we start capturing, we’ll just wait until someone logs in to capture his encrypted password. Everything we capture will be stored in file CAPTURE.cap. I will choose the first one, called NETVEL, and copy the BSSID 98: DE: D0: F9: F8: 3B (MAC address of the access point) and channel number, in this case 13. We should choose the WIFI name (ESSID) whose password we want to capture. airodump-ng wlan0mon Capture encrypted password After running the command below, we will see all of the WIFI networks we have in our range and their parameters. When we managed to handle the previous formalities, the fun part begins at this point. Switch the network card into monitoring mode airmon-ng start Īfter successfully switching to monitoring modeĪfter switching to monitoring mode, our network card will change its name. If you want to try this tutorial how to hack WIFI, it is important that your network card supports the monitoring mode. To find out the driver and chipset used by our network card, we can use the airmon-ng command. We can also use the iwconfig command that shows more information about wireless interfaces on our device. The WIFI network card has the name wlan0. Let’s see what interfaces we have available. This password is encrypted, but can be captured and then broken by a dictionary attack. ![]() The vulnerability is that an access password is exchanged during the login process. The bad news is that this mechanism has its own vulnerabilities too. ![]() Good news is that most people use WPA2-PSK for WIFI security, which uses the powerful AES encryption algorithm. Is it safe to use WIFI on connections that you don’t want someone to capture? Or can your WIFI network introduce a security breach that opens the door to an intruder into your systems? If you don’t follow some recommendations, it could happen very easy. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |