a
Before starting the attack lets have a small introduction about WPA/WPA2 .
Feb 18, 2014 Wordlists Package Description This package contains the rockyou wordlist and contains symlinks to a number of other password files present in the Kali Linux distribution. This package has an installation size of 134 MB. Wordlists Homepage Kali Wordlists Repo.
The next option is “l” which tells the username or login to use. In this case its admin. Next comes the capital “P” option which provides the word list to use. Hydra will pickup each line as a single password and use it. The “v” option is for verbose and the capital “V” option is for showing every password being tried. 31 Dec HOW TO HACK WIFI WPA AND WPA2 WITHOUT USING WORDLIST IN KALI LINUX OR HACKING WIFI THROUGH REAVER Pentester Wifi Hacking; Tags: airmon-ng, airodump-ng, kali wifi hack, reaver, wash no comments.
Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, WEP (Wired Equivalent Privacy).
WPA became available in 2003. The Wi-Fi Alliance intended it as an intermediate measure in anticipation of the availability of the more secure and complex WPA2. WPA2 became available in 2004 and is a common shorthand for the full IEEE 802.11i (or IEEE 802.11i-2004) standard.
A flaw in a feature added to Wi-Fi, called Wi-Fi Protected Setup, allows WPA and WPA2 security to be bypassed and effectively broken in many situations. WPA and WPA2 security implemented without using the Wi-Fi Protected Setup feature are unaffected by the security vulnerability.
WPA2 has replaced WPA. WPA2, which requires testing and certification by the Wi-Fi Alliance, implements the mandatory elements of IEEE 802.11i. In particular, it includes mandatory support for CCMP, an AES-based encryption mode with strong security. Certification began in September, 2004; from March 13, 2006, WPA2 certification is mandatory for all new devices to bear the Wi-Fi trademark.
First we have to check our wifi card is connected with our device or not. To see that we have a command
ifconfig
Now you can see we are having wireless interface as wlan0 connected to our machine.
To capture the packets of the wireless network we need to turn on our wifi card to monitering mode. To do that we have command
airmon-ng start wlan0
Kill all the process/PID which can create problems while cracking.
Now we are in monitoring mode having interface wlan0mon. After entering into monitoring mode please check the interface name again to go further.
we can sniff the packets of the entire network and we can see how many accesspoints are around you. To do that
airodump-ng wlan0mon
Now you are having list of Wifi accesspoints around you , select the desired once you want to crack. To do that
airodump-ng -c 1 –bssid FC:4A:E9:4B:01:8A -w 000 wlan0mon
Do not close this window because you will get handshake here.
To crack the wifi password we need to have handshake i.e to connect any wifi router we need to exchange our key with the router to verify the Guinean user and if our key is correct we will get connected. Every time the user try to connect the exchange of keys take place and the process is called handshake.
Now we are going to take the advantage of this process . Only handshake happens when a user tries to connect to the route, as we can’t wait for the new user to connect .
we can disconnect the user already connected and those users who are disconnected tries to connect back to the route. In the mean time we can sniff handshake. To do this
airreply-ng -0 1000 -a FC:4A:E9:4B:01:8A wlan0mon
It will send Deauth packets to the users and disconnect them don’t stop this process until you get the handshake.
See we got the handshake. This handshake that we captured is saved in a file 000 that we have given in Step 4.
The last and final step to get password . We are having a tool named Aircrack which will brute force the list of word-list password and tries to crack the wifi pin.
To crack the password using Aircrack
aircrack-ng 000.cap -w rockyou.txt
Sucessfully Cracked the wifi password.
Note: This method only works when you are having correct password in your word-list. If you are not having correct password in your word-list file then this attack is of no use.