Hacking Articles
Raj Chandel's Blog
Courses We Offer CTF Challenges Penetration Testing Web Penetration Testing Red Teaming Donate Us
Home » Kali Linux » Crack Wi Password using Aircrack-Ng (Beginner’s Guide)
Kali Linux , Penetration Testing , Wireless Hacking Search
Crack Wi Password using Aircrack-Ng (Beginner’s Guide)
Search … Search
June 25, 2016 By Raj Chandel
This is the classical method of wireless password cracking .All the tools use this method in one way or
other.
Subscribe To Blog Via Email
First start the monitor mode which will listen to all the wi connections nearby with command:
airmon-ng start wlan0 Email Address
In your lower right corner you will see written. monitor mode enabled for [phy1]wlan0mon
Subscribe
Join Our Training Programs
Now run the following command to con rm that our wi adaptor is in monitor mode, so run
command: Follow Me On Twitter
ifcon g
which will show you the wi adaptor as wlan0mon meaning adaptor is in monitor mode. Hacking Articles
@hackinarticles
Now run command: Comprehensive Guide on Password
Spraying Attack
airodump-ng wlan0mon
Today we deal with the technique that at
The above command will start listening to all the available wi connections. first sounds very much similar to
Bruteforcing but trust me, it is not brute-
Now when your target appeas hit ctrl^c and then to capture the handshake type command: force. It is Password Spraying.
hackingarticles.in/comprehensive-
airodump-ng -c 7 –bssid C8:XX:35:XX:FD:F0 –write 1 wlan0mon …#infosec #ctf #redteam #hacking
Here,
-c is the channel no. of the AP which will be listed in CH column in the output of above command as
in my case it is 7.
–bssid is the MAC address of the target AP as in my case it is rajlab and bssid is C8:3A:XX:44:XX:F0
–write is the capture le in which the capture packets will be saved as in my case i have named it as
1 . May 2, 2021
Option Description
-c The channel for the wireless network
–bssid The MAC address of the access point
-w The le name pre x for the le which will contain authentication handshake
mon0 The wireless interface
Categories
Cryptography & Stegnography
CTF Challenges
Cyber Forensics
Database Hacking
Footprinting
Hacking Tools
Kali Linux
Nmap
Others
Password Cracking
Penetration Testing
Pentest Lab Setup
Privilege Escalation
Red Teaming
Social Engineering Toolkit
Uncategorized
Website Hacking
Window Password Hacking
Now start the deauth attack to disconnect all the connected clients to that AP which will help in
Wireless Hacking
capturing the handshake with command:
aireplay-ng -0 100 –a XX:3A:35:XX:FD:F0 -e rajlab wlan0mon
Here, Articles
-0 is used for deauth attack
100 is no. of deauth packets to be sent Select Month
-a is the target AP MAC address
-e is ESSID of the target AP i.e. name of the target AP
After launching the deauth attack we will get the WPA handshake in the previous terminal window in
the top right corner then hit ctrl^c.
Now we have to crack the password with aircrack-ng so type command :
aircrack-ng 1-01.cap –w /usr/share/nmap/nselib/data/passwords.lst
Here,
1-01.cap is the capture le we generated in the airodump-ng .
-w is the dictionary to be used to perform dictionary attack
In my case the key is found as KEY FOUND! [raj123987]
Author: Himanshu Gupta is a Information Security Researcher | Technical writer. You can follow him
on LinkedIn .
FACEBOOK T WITTER PINTEREST LINKEDIN
PREVIOUS POST NEXT POST
Cracking WiFi Password using Fern WIFi Cracker 3 Ways to Crack Wi using Pyrit, oclHashcat and
Cowpatty
Leave a Reply
Your email address will not be published. Required elds are marked *
Comment *
Name *
Email *
Website
Notify me of follow-up comments by email.
Notify me of new posts by email.
Post Comment
You may like
Wireshark for Pentester: Password Sni ng Wireshark For Pentester: A Beginner’s Guide
April 28, 2021 April 13, 2021