Before even starting to read this make sure you have compatible wireless adapter!
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
![[Image: 86437852.png]](http://img69.imageshack.us/img69/342/86437852.png)
Once the program is started go to "Configuration" tab.
![[Image: 79399926.png]](http://img846.imageshack.us/img846/2103/79399926.png)
Press "Set random MAC address"
![[Image: 12150512.png]](http://img38.imageshack.us/img38/1104/12150512.png)
Then "Enable/Disable Monitor Mode"
![[Image: 21993618.png]](http://img412.imageshack.us/img412/8135/21993618.png)
Now press "Rescan networks" and choose the slave.
![[Image: 48030887.png]](http://img24.imageshack.us/img24/3928/48030887.png)
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
![[Image: 42338878.png]](http://img849.imageshack.us/img849/3088/42338878.png)
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
![[Image: 20865461.png]](http://img207.imageshack.us/img207/6392/20865461.png)
Then press "Associate with AP using fake auth"
![[Image: 72909853.png]](http://img64.imageshack.us/img64/5939/72909853.png)
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
![[Image: 39811637.png]](http://img24.imageshack.us/img24/5476/39811637.png)
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
![[Image: 66665680.png]](http://img267.imageshack.us/img267/2707/66665680.png)
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
![[Image: 38943479.png]](http://img337.imageshack.us/img337/2769/38943479.png)
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
![[Image: 86437852.png]](http://img69.imageshack.us/img69/342/86437852.png)
Once the program is started go to "Configuration" tab.
![[Image: 79399926.png]](http://img846.imageshack.us/img846/2103/79399926.png)
Press "Set random MAC address"
![[Image: 12150512.png]](http://img38.imageshack.us/img38/1104/12150512.png)
Then "Enable/Disable Monitor Mode"
![[Image: 21993618.png]](http://img412.imageshack.us/img412/8135/21993618.png)
Now press "Rescan networks" and choose the slave.
![[Image: 48030887.png]](http://img24.imageshack.us/img24/3928/48030887.png)
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
![[Image: 42338878.png]](http://img849.imageshack.us/img849/3088/42338878.png)
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
![[Image: 20865461.png]](http://img207.imageshack.us/img207/6392/20865461.png)
Then press "Associate with AP using fake auth"
![[Image: 72909853.png]](http://img64.imageshack.us/img64/5939/72909853.png)
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
![[Image: 39811637.png]](http://img24.imageshack.us/img24/5476/39811637.png)
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
![[Image: 66665680.png]](http://img267.imageshack.us/img267/2707/66665680.png)
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
![[Image: 38943479.png]](http://img337.imageshack.us/img337/2769/38943479.png)
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
![[Image: 77928950.png]](http://img840.imageshack.us/img840/2060/77928950.png)
Video Tutorial:
0 comments:
Post a Comment