MouthShut.com Would Like to Send You Push Notifications. Notification may includes alerts, activities & updates.

OTP Verification

Enter 4-digit code
For Business
Blogs by pawanthekumar80
Posted Jul 21, 2016 | General | 199 Views   

Wifi hacking trick

Various wireless security protocols were developed to protect home wireless networks. These wireless security protocols include WEP, WPA, and WPA2, each with their own strengths ? and weaknesses. In addition to preventing uninvited guests... Various wireless security protocols were developed to protect home wireless networks. These wireless security protocols include WEP, WPA, and WPA2, each with their own strengths ? and weaknesses. In addition to preventing uninvited guests from connecting to your wireless network, wireless security protocols encrypt your private data as it is being transmitted over the airwaves. Wireless networks are inherently insecure. In the early days of wireless networking, manufacturers tried to make it as easy as possible for end users. The out-of-the-box configuration for most wireless networking equipment provided easy(but insecure) access to a wireless network. Although many of these issues have since been addressed, wireless networks are generally not as secure as wired networks. Wired networks, at their most basic level, send data between two points, A and B, which are connected by a network cable. Wireless networks, on the other hand, broadcast data in every direction to every device that happens to be listening, within a limited range. Following are descriptions of the WEP, WPA, and WPA2 wireless security protocols: Wired Equivalent Privacy(WEP): The original encryption protocol developed for wireless networks. As its name implies, WEP was designed to provide the same level of security as wired networks. However, WEP has many well-known security flaws, is difficult to configure, and is easily broken. Wi-Fi Protected Access(WPA): Introduced as an interim security enhancement over WEP while the 802.11i wireless security standard was being developed. Most current WPA implementations use a preshared key(PSK), commonly referred to as WPA Personal, and the Temporal Key Integrity Protocol(TKIP, pronounced tee-kip) for encryption. WPA Enterprise uses an authentication server to generate keys or certificates. Wi-Fi Protected Access version 2(WPA2): Based on the 802.11i wireless security standard, which was finalized in 2004. The most significant enhancement to WPA2 over WPA is the use of the Advanced Encryption Standard(AES) for encryption. The security provided by AES is sufficient(and approved) for use by the U.S. government to encrypt information classified as top secret ? it?s probably good enough to protect your secrets as well! Table of Contents How are wireless networks secured? What you'll need Setting up CommView for Wi-Fi Selecting the target network and capturing packets Waiting. Now the interesting part. CRACKING! Are you a visual learner? Step 1: How Are Wireless Networks Secured? In a secured wireless connection, internet data is sent in the form of encrypted packets. These packets are encrypted with network security keys. If you somehow manage to get hold of the key for a particular wireless network you virtually have access to the wireless internet connection. Broadly speaking, there are two main types of encryptions used. Step 2: What You'll Need A compatible wireless adapter: This is by far the biggest requirement.The wireless card of your computer has to be compatible with the software CommVIew. This ensures that the wireless card can go into monitor mode which is essential for capturing packets. Click here to check if your wireless card is compatible CommView for Wi-Fi: This software will be used to capture the packets from the desired network adapter. Click here to download the software from their website. Aircrack-ng GUI: After capturing the packets this software does the actual cracking. Click here to download the software from their website. A little patience is vital. Step 3: Setting Up CommView for Wi-Fi Download the zip file of CommView for Wi-Fi from the website. Extract the file and run setup.exe to install CommView for Wi-Fi. When CommView opens for the first time it has a driver installation guide. Follow the prompts to install the driver for your wireless card. Run CommView for Wi-Fi. Click the play icon on the top left of the application window. Start scanning for wireless networks. CommView now starts scanning for wireless networks channel by channel. After a few minutes you will have a long list of wireless networks with their security type and signal. Now it is time to choose your target network. Step 4: Selecting the Target Network and Capturing Packets A few things to keep in mind before choosing the target wireless network: This tutorial is only for WEP encrypted networks, so make sure you select a network with WEP next to its name. If you need to crack a WPA encrypted network, follow this tutorial instead. Choose a network with the highest signal. Each network will have its details in the right column. Make sure the WEP network you are choosing has the lowest dB(decibel) value. Once you have chosen your target network, select it and click Capture to start capturing packets from the desired channel. Now you might notice that packets are being captured from all the networks in the particular channel. To capture packets only from the desired network follow the given steps. Right click the desired network and click on copy MAC Address. Switch to the Rules tab on the top. On the left hand side choose MAC Addresses. Enable MAC Address rules. For'Action' select'capture' and for'Add record' select'both'. Now paste the mac address copied earlier in the box below. We need to capture only data packets for cracking. So, select D on the bar at the top of the window and deselect M(Management packets) and C(Control packets). Now you have to save the packets so that they can be cracked later. To do this: Go to the logging tab on top and enable auto saving. Set Maximum Directory Size to 2000. Set Average Log File Size to 20. Step 5: Waiting. Now the boring part- WAITING! NOTE: The amount of time taken to capture enough data packets depends on the signal and the networks usage. The minimum number of packets you should capture should be 100,000 for a decent signal. After you think you have enough packets(at least 100,000 packets), you'll need to export them. Go to the log tab and click on concatenate logs. Select all the logs that have been saved. Do not close CommView for Wi-Fi. Now navigate to the folder where the concatenated logs have been saved. Open the log file. Select File- Export -Wire shark tcpdump format and choose any suitable destination. This will save the logs with a .cap extension to that location. Step 6: Now the Interesting Part. CRACKING! Download Aircrack-ng and extract the zip file. Open the folder and navigate to'bin'. Run Aircrack-ng GUI. Choose WEP. Open your .cap file that you had saved earlier. Click Launch. In the command prompt type in the index number of your target wireless network. Wait for a while. If everything goes fine, the wireless key will be shown. You may also receive a request to try with more packets. In this case wait until more packets have been captured and repeat the steps to be performed after capturing packets. BEST OF LUCK!.this trick is shared by Pawan kumar Read More
Tags: wifi hacking
X