tabbbel paniah rawlee

0 views
Skip to first unread message

Asdrubal Dagreat

unread,
Aug 3, 2024, 8:41:17 PM8/3/24
to haydorreaho

How To Crack Wifi WPA And WPA2 PSK Passwords Using Kali Linux

Wifi networks are often secured with WPA or WPA2 encryption, which requires a password or a passphrase to access. However, these passwords can be cracked by using a tool called aircrack-ng, which is included in Kali Linux, a popular operating system for ethical hacking and penetration testing. In this article, we will show you how to use aircrack-ng to crack wifi passwords in a few simple steps.

Step 1: Install Kali Linux

Kali Linux is a free and open-source operating system that comes with hundreds of tools for ethical hacking and security testing. You can download it from www.kali.org/downloads/ and install it on your computer or run it as a live system from a USB drive or a DVD. You can also use it as a virtual machine on your existing operating system.

Step 2: Find The Target Network

Before you can crack the wifi password, you need to find the target network and its details, such as the network name (SSID), the encryption type (WPA or WPA2), and the MAC address (BSSID). You can use a tool called airmon-ng, which is part of the aircrack-ng suite, to scan for nearby wifi networks and display their information. To use airmon-ng, you need to put your wireless adapter into monitor mode, which allows it to capture all the traffic on the air. To do this, open a terminal and type the following command:

sudo airmon-ng start wlan0

Replace wlan0 with the name of your wireless interface. You can find it by typing iwconfig in the terminal. You should see something like this:

wlan0     IEEE 802.11bgn  ESSID:"MyWifi"  
Mode:Managed Frequency:2.437 GHz Access Point: 00:11:22:33:44:55
Bit Rate=72.2 Mb/s Tx-Power=20 dBm
Retry short limit:7 RTS thr:off Fragment thr:off
Power Management:on
Link Quality=70/70 Signal level=-30 dBm
Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
Tx excessive retries:0 Invalid misc:0 Missed beacon:0

The name of your wireless interface is wlan0 in this example. After running the airmon-ng command, you should see something like this:

PHY	Interface	Driver		Chipset
phy0 wlan0 ath9k Qualcomm Atheros QCA9565 / AR9565 Wireless Network Adapter (rev 01)
(monitor mode enabled on mon0)

This means that your wireless interface is now in monitor mode and has a new name, mon0 in this example. You can use this name for the next steps.

Step 3: Capture The Handshake

A handshake is a process that occurs when a device connects to a wifi network. It involves exchanging cryptographic keys between the device and the router, which are used to encrypt and decrypt the data. By capturing the handshake, you can use it to crack the wifi password later. To capture the handshake, you need to use another tool called airodump-ng, which is also part of the aircrack-ng suite. To use airodump-ng, open another terminal and type the following command:

sudo airodump-ng mon0

Replace mon0 with the name of your monitor interface. You should see something like this:

BSSID              PWR RXQ  Beacons    #Data, #/s  CH  MB   ENC  CIPHER AUTH ESSID
00:11:22:33:44:55 -30 100 10000 500 5 6 54e. WPA2 CCMP PSK MyWifi
11:22 51082c0ec5
Reply all
Reply to author
Forward
0 new messages