Hello Friends...!!
How are you I hope you all are fine and learn new things in your life, In todays Post Here I am going tell you about How To Hack Someone's Wifi ! So are you excited ? let's make it huge for you now started.
(STEP-l)
Put Wi-Fi Adapter in Monitor Mode with Airmon-Ng. For this to work, we'll need to use a compatible wireless network adapter. It allows us to see all of the wireless traffic that passes by us in the air.
Let's open a terminal and type:
airmon-ng start wlanO
Note:- that airmon-ng has renamed your wlan0 adapter to mon0.
(STEP-2)
Capture Traffic with Airodump-Ng
Now that our wireless adapter is in monitor mode, we have the capability to see all the wireless traffic that passes by in the air. We can grab that traffic by simply using the airodump-ng command.
This command grabs all the traffic that your wireless adapter can seen and displays critical information about it
Lets to it by typing:
airodump-ng monO
Note:- all of the visible APs are listed in the upper part of the screen and the clients are listed in the lower part of the screen.
(STEP-3)
Focus Airodump-Ng on One AP on One Channel
Our next step is to focus our efforts on one AP, on one channel, and capture critical data from it. We need the BSSID and channel to do this.
Let's open another terminal and type:
airodump-ng --bssid 08:86:30:74:22:76 -c 6 --write WPAcrack mon0
Because according to this text:
08:86:30:74:22:76 is the BSSID of the AP
-c 6 is the channel the AP is operating on
WPAcrack is the file you want to write to
mon0 is the monitoring wireless adapter”
(STEP-4)
Aireplay-Ng Deauth
In order to capture the encrypted password, we need to have the client authenticate against the AP. If they're already authenticated, we can de-authenticate them (kick them off) and their system will automatically re- authenticate, whereby we can grab their encrypted password in the process.
Let's open another terminal and type:
aireplay-ng --deauth 100 -a 08:86:30:74:22:76 mon0
100 is the number of de-authenticate frames you want to send
08:86:30:74:22:76 is the BSSID of the AP
mon0 is the monitoring wireless adapter
(STEP-5)
Capture the Handshake
In the previous step, we bounced the user off their own AP, and now when they re-authenticate, airodump-ng will attempt to grab their password in the new 4-way handshake. Let's go back to our airodump-ng terminal and check to see whether or not we've been successful.
Notice in the top line to the far right, airodump-ng says “WPA handshake" This is the way it tells us we were successful in grabbing the encrypted password! That is the first step to success!
(STEP-6)
Let's Aircrack-Ng That Password!
Now that we have the encrypted password in our file WPAcrack, we can run that file against aircrack-ng using a password file of our choice. Remember that this type of attack is only as good as your password file. I'll be using the default password list included with aircrack-ng on BackTrack named darkcode.
We'll now attempt to crack the password by opening another terminal and typing:
aircrack-ng WPAcrack-01.cap -w /pentest/passwords/wordlists/darkcode
WPAcrack-01.cap is the name of the file we wrote to in
the airodump-ng command.
/pentest/passwords/wordlist/darkcode is the absolute path to your password file
DISCLAIMER !!!
This post is only for EDUCATIONAL PURPOSE and I have made this post, so that you can make your wi-fi more secure. I will not be responsible for your any illegal activities. Please don’t even try it if you are a beginner because it can put you in a big trouble.
If you think this post is useful for you and you learn new thing Today Tell us in comment
➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖
➡️ Social Media hacking video - https://youtu.be/gegPrHMRwyg
➡️ Instagram hacking video - https://youtu.be/gegPrHMRwyg
➡️ Follow Our Instagram Page- https://www.instagram.com/hackwithdevil/
➡️Follow Our Facebook Page- https://www.facebook.com/Hack-With-Devil
Plz Like and Comments
PLZ SUBSCRIBE TO OUR CHANNEL
0 Comments