Before even starting to read this make sure you have compatible wireless adapter!
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
![[Image: 86437852.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uS38cHRydL8rsaoupq4N25t_SOEZIZeN71neSJ9wtguwWGGqOTStF7gsQ4OPFZfA6oGocFtcrR-03e_vf7GPgJyqj8Tp83BAAI-_iLwt4EsvqRyvY=s0-d)
Once the program is started go to "Configuration" tab.
![[Image: 79399926.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uphow-rlFwxijsAO9kniXAyAzcMOokx0sJBI--Mu0q6bHeugv3DfOgBbpF_ywfiUW3gsCrrw13lE_QBrVp23R3vsJ9yMbs-AQhAeOG7uKHXZRjzVyKrOM=s0-d)
Press "Set random MAC address"
![[Image: 12150512.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uGifYx2W9xU-AbV5lxHVQu9ML13Y8VEi4U-FP7DTprCVS2t38AmA4Gx2hbZVZf33ZBi3c85Fy8Vy4FB458ZjNEeqeTQ_gwP93-9ap1uxoCmK3I_f1m=s0-d)
Then "Enable/Disable Monitor Mode"
![[Image: 21993618.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sd2qSIsRJQyiVsfmpcF0mamfi1Kxv_WfzGU60EMXhdnI108df_ZvjrQLrltTn-hV5dTxE0H5lxxJZGbs4yK4DLC2a32g4naZDLbWJMOEFKdBEk2-OEE4s=s0-d)
Now press "Rescan networks" and choose the slave.
![[Image: 48030887.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_s15dHbEpNBV8eVq8ht4Wo7KPjx60y9DM518qdbqtSahcjSaFTXn9ZyFbUc5XdrurZNW1tRbF2p3reOSzYQ_CKJRKo7uqVaS6ay9IDs4N1SjaLsyj8=s0-d)
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
![[Image: 42338878.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_trYreo-vkNiJCErwq9iwS0HodEz8xC83AKQen_1m9Jh_xeDIIvI9FB7ML7zE-vZVxXk2DTi79U0y4WOA2qzQdd58veGvfvCoJ7_hpUAt05euHI4j-p_Q=s0-d)
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
![[Image: 20865461.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tgsKl-8-yrF1SVjZpyW7crO6IxrmBcF1P7CVxxX3P3331PXrtpEM0MHfHj80uiJK6LxnI3nNJ0V0gobAtLVvLF9tQzYhQvvWcsYZE2Uro9Mwvgyx_WSu0=s0-d)
Then press "Associate with AP using fake auth"
![[Image: 72909853.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uRmpUyh0uQzaU2uQVhAfppMOYiMS4Jd3byn2RgJBT4y2BGR-OwAwW2QUdIwTLqgbb5liGozxbGJcisXJkdNPO31pCFbYYbokyX044_tb3HW_dLpRr3=s0-d)
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
![[Image: 39811637.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tX7_lfTJRUDj-so6hP1AlOQCNt3EPCDBa7jlZwMb6tNq0A6YfBZNKoWauu5lWKHbjyDbN77epgtT9mHcnMqJPIg6ixYCRUB7nsQQBVbi_I-8StqajY=s0-d)
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
![[Image: 66665680.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tzdgU66JMeCzJDOYPBhJ_108p9DefOmSGbktZy8gyoFc2sa5ffjf5C3ayhx6TfGfh90gWz6u1j6JJFRQN6XJxLIyV2nHheA_ZVi8-FekUhkzIcj--mDvI=s0-d)
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
![[Image: 38943479.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uiVNEQqklTT3iWfR8Toqmt-RsHT5JUjAzQspy09mGi6yXuiwOOu-yibBgRc-IxoOd0mBf7IqE-PJhfcV2kZmPN_G2ik0092mjSph4XWYfZsaGpVuXYaQs=s0-d)
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
Once the program is started go to "Configuration" tab.
Press "Set random MAC address"
Then "Enable/Disable Monitor Mode"
Now press "Rescan networks" and choose the slave.
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
Then press "Associate with AP using fake auth"
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
Video Tutorial:
0 comments:
Post a Comment