Posts

Showing posts with the label aircrack-ng

Hacking WPA/WPA2 without dictionary/bruteforce : Fluxion

Image
Fluxion (linset) I hadn't ventured into Hackforums since a while, and this time when I went there I saw a thread about a script called  Fluxion . It's based on another script called  linset  (actually it's no much different from linset, think of it as an improvement, with some bug fixes and additional options). I did once think about (and was asked in a comment about) using something like a man in the middle attack/ evil twin attack to get WPA password instead of going the bruteforce/dictionary route, but never looked the idea up on the internet nor spent much time pondering over it. However, once I saw the thread about this cool script, I decided to give it a try. So in this post I'll show you how I used Fluxion, and how you can too. Disclaimer : Use this tool only on networks you own .Don't do anything illegal. Contents Checking if tool is pre-installed, getting it via github if it isn't. Running the script, installing dependencies if required. Quick ov...

Hack WPA/WPA2 PSK Capturing the Handshake

Image
 WPA password hacking Okay, so hacking WPA-2 PSK involves 2 main steps- Getting a handshake (it contains the hash of password, i.e. encrypted password) Cracking the hash. Now the first step is conceptually easy. What you need is you, the attacker, a client who'll connect to the wireless network, and the wireless access point. What happens is when the client and access point communicate in order to authenticate the client, they have a 4 way handshake that we can capture. This handshake has the hash of the password. Now there's no direct way of getting the password out of the hash, and thus hashing is a robust protection method. But there is one thing we can do. We can take all possible passwords that can exists, and convert them to hash. Then we'll match the hash we created with the one that's there in the handshake. Now if the hashes match, we know what plain text password gave rise to the hash, thus we know the password. If the process sounds really time consum...

WPA/WPA2 cracking using Dictionary attack with Aircrack-ng

Image
WPA cracking involves 2 steps- Capture the handshake Crack the handshake to get the password We have already covered WPA-handshake capture in a lot of detail. In this tutorial we will actually crack a WPA handshake file using dictionary attack. Our tool of choice for this tutorial will be aircrack-ng. We will not bother about the speed of various tools in this post. However, in the next post, we will compare various CPU and GPU algorithms for WPA hash cracking. I'd like to add that I already know the password of the network so I'll simply put it into the dictionary that I'm using. A full fledged dictionary attack is quite time consuming. Also, a lot of people are facing problems with monitor mode in Kali 2.0. I have a post regarding that coming soon. PS: If you stumbled on this post out of nowhere and find it hard to follow, I recommend you go through some of the easier posts first.  How to use this site  is a good place to begin. My current state I have alr...