Before even starting to read this make sure you have compatible wireless adapter!
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
![[Image: 86437852.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v8srNDkSmH-5Uhfy9FzAQk4CYQPcXAeuRcehOaLCc30mggCpZWqkq-eBgz8SUk0644I-fRHgk7RHveK4o8kTAfqYEzS1OasdHtw0tSYDbOSWWHTCE=s0-d)
Once the program is started go to "Configuration" tab.
![[Image: 79399926.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vFOe7c_RU9Cj_7Ggsg2XDVdZp9l7p9uXmn8mlRsBiXMmBmuEXs3sU6W3YUkzZPxJI37nuG9H0S-kUteSMiytoVzzlkjJYZD2D-wqB0-eUERdKom9U_Xls=s0-d)
Press "Set random MAC address"
![[Image: 12150512.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vy6jUpjxapSSW_DboAabvRVeer5AyHymkIYiu7Kw3U3vMgN39yP5_AB-vWBS2oeMTuocK62lICQnk65c1POQ2wpA-MD9TMgoLTq58Y1752lmIf0Fae=s0-d)
Then "Enable/Disable Monitor Mode"
![[Image: 21993618.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sbOkTknbo9ebmHUj3CUYjm4QhG33BbSUPltrD_UKCcrSaEx8ernGZqN1NjP5grKkz7pr9k87OS-EW-aPm2hosIebFtoscK9jtoI2w9_zldOFuZ_-QizG0=s0-d)
Now press "Rescan networks" and choose the slave.
![[Image: 48030887.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vJojrzbN8znAA0KozrO2XNS47L5mx5jykCClenWjvvSKcmIX1nvyEgN6BmNrjxRo2eoY2gsQPqJgGOiCrA9vXKSWUk0wX3-XM6yqB72KQ-IoO_lTw=s0-d)
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
![[Image: 42338878.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_slhuduo8nGhsx_r49ncpv4ZA7s7iLxj1ZgmrZIbhu3C4L884VMgJsNYhcVDygvOIxgMKd5emLcbNl3DVo2lN0RUyB2lLwAT3bUkdMTNsHgZhYwvzCPfg=s0-d)
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
![[Image: 20865461.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sIavklvXYCpW-1vgw29Np5iccOx4VT0rVysKrHNAE5BPOwdC_9GUTHkeJevBf26-EqzHS5T4rwKduz53ca64VSUpKDNSFDzrZeXFS6F8zIyNUg5UoDsJs=s0-d)
Then press "Associate with AP using fake auth"
![[Image: 72909853.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sFJFNCRrfMGk9eASNjdGEa_9OkARuU3rKewsXmYiKvXy0PT20WJsUVw8eRxAlvyzsWzgYZ9tjDZJB_3F2ITt3STPVpSN8w5cQ89Cq96r5YDTJbSQaC=s0-d)
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
![[Image: 39811637.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vyLx85EXcG7LGxYMsZq9eQiUiv1j_vetML8-dTd2iS3fPguqi7Zu-caPTILZlMYlVdxvRpdVZYztIhzfa_PpYi_GRjvcsSt9TOhnrqJrx22wcYkE3D=s0-d)
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
![[Image: 66665680.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_scOMehxQl-DMuhFkKHYMCWbhM3qJiZP5b8Zac6EQ-shIKcYup1QL-v_GLcBO0QjVv0HpUhMzzCGtBhZCdpJxOf_XrdjjBufcAYSdJkg8ahRmEcgDimAu4=s0-d)
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
![[Image: 38943479.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_s0m0DXssxRgJRPFRPNticMk6L8ufe5FcbwJqZCKwLGBcNcka2vjE8FtTj4oCyLBKWabkDvXmz7opzSkRrcDJCWH-C1wD38uOMZ6vuQp3nVPytie4Geuwc=s0-d)
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
Once the program is started go to "Configuration" tab.
Press "Set random MAC address"
Then "Enable/Disable Monitor Mode"
Now press "Rescan networks" and choose the slave.
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
Then press "Associate with AP using fake auth"
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
Video Tutorial:
0 comments:
Post a Comment