We will do all this process on our Linux system, for which we have to first copy some commands.
Essentially, Wi-Fi hacking is cracking the security protocols in a wireless network, granting complete access for the hacker to view, store, download, or abuse the wireless network. With all the information gathered from your compromised Wi-Fi, hackers can use your information for their own personal requirements.
This technique functions in the following way:
- Primarily, we will be going to discover targeted Wi-Fi (Access Point) through monitoring the Wi-Fi signals.
- Then, it is essential on our part to send de-authentication packets to the AP which will compel the clients connected to the access point to obtain disconnect from the AP.
- When the client will attempt to reconnect to the AP, we will grab the 4-way handshake file which comprises the password in encrypted form.
- After that, to get the password, we will be going to use aircrack-ng to crack the handshake file
- Make sure you have Kali installed on your computer or installed as dual-boot or just run kali as a live Operating System and you are in the range of Wi-Fi on which you intend to carry out the attack.
- Make sure you have an external Wi-Fi adapter that supports packet injection and monitor mode If you want to use a virtual machine.
- If you don’t have an external Wi-Fi adapter, install kali as dual-boot on your PC or laptop.
The following steps will help you crack a Wi-Fi password using kali.
Use the keyboard shortcut Ctrl+alt+t or type terminal in the search box to open a terminal window in Kali.
You are required to know first the name of your Wi-Fi adaptor before putting your Wi-Fi into monitor mode and for that type in the following command in the terminal.
Now to put this adaptor into monitor mode type the subsequent command in the terminal.
airmon-ng start wlan0
While your Wi-Fi is in monitor mode, notice that you can’t use your internet. And my adaptor name is changed from wlan0 to wlan0mon.
We are required to kill background processes before we start monitoring Wi-Fi signals. So that they will not be able to interrupt while we are working in monitoring mode, for that type following command in the terminal window.
You can start monitoring the Wi-Fi signals near you, after putting your Wi-Fi into monitor mode.
3. Start monitoring Wi-Fi signals
We are going to use airodump-ng command to start monitoring Wi-Fi signals. Just type the subsequent command in the terminal.
On the upper part of the screen, all the visible access points (APs) are shown and all the clients which are connected to the APs are listed below.
If you came across your target in the list of visible APs and at least one client connected to that AP, we can go further else you require to wait for somebody to get connected to that AP first.
Now open up a new terminal window (don’t close the present window) because we required to copy bssid and channel from the current window.
Type the following command in the terminal window.
In order to capture the hand-shake which contains the encrypted password, we need to disconnect the connected clients from the AP. For that open a new terminal window and type the following command.
And when they will try to reconnect to the AP we will get the file containing the encrypted password. As you can see in the following image we got a message saying “WPA Handshake: BSSID of target” this message means our attack is successful, and we are able to capture the handshake file.
We can find a capture file on the location we specified in the 4th step, in my case it's root/WPfile-01.cap
Now, to decrypt the password present in our file WPfile-01.cap, we need to run the following command against this file using a password list, in my case, I am using a custom password list named PasswordList.txt.
Type the following command.
airmon-ng stop wlan0mon
service NetworkManager restart
- Change your default password
- Increase the length of your password (min 12 characters)
- Introduce some symbols and numbers in your password
- Restrict access to your network by permitting only registered MAC addresses
Share To Your Friends And Learn Together With Us
⚠️Nᴏᴛᴇ:- Tʜɪs ᴀʟʟ ɪɴғᴏʀᴍᴀᴛɪᴏɴ ᴘʀᴏᴠɪᴅᴇᴅ ʙʏ ᴜs ɪs ᴏɴʟʏ ғᴏʀ ᴍᴀᴋᴇ ʏᴏᴜ ᴍᴏʀᴇ ᴀᴡᴀʀᴇ ᴀɴᴅ sᴇᴄᴜʀᴇ ғʀᴏᴍ ᴛʜɪs ᴛʏᴘᴇ ᴏғ ʜᴀᴄᴋɪɴɢ ᴏʀ ᴄʀᴀᴄᴋɪɴɢ ᴀɴᴅ ɪғ ʏᴏᴜ ᴜsᴇ ɪᴛ ɪɴ ɪʟʟᴇɢᴀʟ ᴘᴜʀᴘᴏsᴇ ᴛʜᴇɴ ᴡᴇ ᴀʀᴇ ɴᴏᴛ ʀᴇsᴘᴏɴsɪʙʟᴇ ғᴏʀ ᴛʜᴀᴛ !
➖➖➖➖➖➖➖➖➖➖➖➖
👍ʜᴏᴘᴇ ʏᴏᴜ ɢᴜʏs ʟɪᴋᴇ ᴛʜɪs ᴘᴏsᴛ
0 Comments