How To
Cracking WPA/WPA2 –
PSK Encryption
About a month ago, to my embarrassment, I learned that my Wi-Fi password
was so weak that even my 10 year old neighbor could crack it…
No, not really.
§ A little Disclaimer – The contents of
this post are solely for ethical and educational purposes. You may not use it
for unethical purposes. The Author or the Website is not responsible for any
damage to yourself, your network, or the computers in you network, should
something go wrong. (Basically guys, be careful where you use this and please
don’t do anything stupid.)
We’re going to start with a little introduction to Kali Linux, because
that is the OS I prefer, is the easiest for this task and comes with all the
tools we need. “Kali” is a Linux distribution and is the successor to the much
acclaimed Backtrack, which many of you reading this article will probably know
of. Now, there are many ways of installing and using Kali, if anyone needs any
help, leave in the comments, and I will probably write another post about
installing and its basics in the future.
In this tutorial, I’m going to hack into a Wi-Fi hotspot that I just set
up, named – Anonymus.
Now, given that we have Kail Linux, open up a terminal window, type in
“ifconfig “. This is going to list all the networking interfaces connected to
your device.
Here, we only need (wlan0) which is our Wi-Fi card, so we can disable
the others by doing “ifconfig <name of the interface> down”.
(“lo” does no matter)…
Now, we type “airmon-ng start wlan0”
(airmon-ng is just a tool for monitoring air traffic, “start” basically
starts the tool, and “wlan0” specifies the interface we are using for
monitoring)
It’ll probably show “some processes that could cause trouble”, we’ll simply
kill those processes by entering “kill <process ID>”.
Now if we do “ifconfig”, it should show us the newly made monitoring
interface “mon0”.
Then, put in, “airodump-ng mon0”.
In the screenshot below, the highlighted bssid is our target (and it is my
own), named “Anonymus”, the channel is 13 as we can see under the “CH” column.
For our next step we type in, “airodump-ng –c <channel> -w
<name> –bssid <bssid> mon0”.
Let me explain a few things here, “airodump-ng” is a tool for capturing
Wi-Fi packets, “<channel>” means the channel your target is running on,
“-w” basically writes a file by the name that succeeds it in “<name>”, (I
did “handshake” just for the convenience of it) bssid is a string of numbers
specific to a hotspot.
Now, open up a new terminal and type in “aireply-ng -0 0 –a
<bssid> mon0”, this command send a deauthentication signal (usually
called a deauth packet) to all the devices connected to that hotspot. Then
after a few seconds we stop it by “Ctrl+C”. Now, as we can see, the other
terminal shows that the WPA Handshake was successfully captured.
We can close both windows at this point, and open a new one. Type “ls”;
that should list the files in the current directory. We can clearly see that
the files from the above operation are present. But we only need the file
ending with “-01.cap”.
Then we do, “aircrack-ng –w <full location of the wordlist>
<the file name>”.
You may be asking what wordlist? What
is that sh*t?
A Wordlist is a file containing thousands of known and possible passwords,
which you can download from the internet (“specifying from the internet” – We
ain’t dumb, boy! :P). The one I used can be found here. The list contains 982,963,904 words
exactly all optimized for WPA/WPA2. Would also just like to point out that this
is not my work, I got it from forums.hak5.org. It was a guy who compiled a
whole load of useful lists, including his own to come up with 2 lists (one is
11gb and one is 2gb) I will be seeding this torrent indefinitely since it is
shareware and awesome!
It will then start searching for
matching keys in the word list. Now the time that this will take is solely
dependent on the strength of the password. The stronger the password the more
time will it take. For very strong passwords, check this out. For tips on
creating your own strong password – Top 10 Tips to Create a Strong Password
After completion it looks something like the screenshot below. In it, you can
see that it tested 45688 keys and my key was the 45689th. I purposely put
futurama because frankly, futurama is awesome! Also it is a very weak password
(People reading this, if your password is “futurama”, you’re cool! The Hell?
Change it right now!)
Now that we know the password, lets test it…
Annnnd… Voila! it works!
Knowing this you will be…
NIIT PROGRAMMER'SPROGRAMMING GIANT'S
nice blog for Knowledge and practicle session..
ReplyDelete