Before even starting to read this make sure you have compatible wireless adapter!
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
![[Image: 86437852.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vXbJMz8a7YMmfaeyzAfETXjjIjhtr28W0yhRa4A9_AuyFsJ89g6hFmazHrx8Te02R31hdEwNhINNIv-gK91-FCh1LtXTS8EnxaKeWl76dLCD12HhE=s0-d)
Once the program is started go to "Configuration" tab.
![[Image: 79399926.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_s9Uxcf4mG48cyzGK5gW0zxcAGQV96ubEJthN26nLDWOOb6qTT64d4r8qCyCA3PHGG5m7jBU_flf7LebFs-LRzGqgtV6Uyt6IEhVNW2WWeyZL8cHqf9a_k=s0-d)
Press "Set random MAC address"
![[Image: 12150512.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vGIxQzZgRBZOwlmjupwx8vnX1xuDWAUG0X0jCQ5m25DvpqOWlkDbS3KopQIXQGXXif4JFPJ07FGutVMhM46k2gwFqevqVHyWjgx8nETspSXOOd2V3m=s0-d)
Then "Enable/Disable Monitor Mode"
![[Image: 21993618.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_s_7eQASG1aqJokhnx827P_lZgbWf1gRxxynEw-W1gs-j-zQ0E-WrsQwG5iIpCqbXaczAHkAF0okUilOJ2g9auHsq4O9jqLm-sItNHeD0ZRk-ZkKXDm5Pw=s0-d)
Now press "Rescan networks" and choose the slave.
![[Image: 48030887.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sqsiXbjx8DZWuHbnbV1NRcxEkC1UABLz_pPT-6MbW4607TmDwa8VxvuyQA_k-TgAU1ICIdMWXKtybCYTtFxsLb7VtLNtPr3InQjz2YfnINi_i55Pk=s0-d)
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
![[Image: 42338878.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uH_cTznAUIpFy596rYjPL7mSWOH6X3rKrRJEBWShm06K41sloci46ILI66_mD6HCWEWTLzJOCUc3-P_HR1viqFh44TE5GmBrG9QozCXvMS4U6Qty1Esg=s0-d)
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
![[Image: 20865461.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tZ68igSlcSUo-8eoqiFBIyFPibnuLeqhuT5rIbJ4zGlXZc9wsEC-F8H1-wHVij_ukfC0HJrnLOPzTo9u0VI4J2w5ML5NTDGqZEl9ITedu8zzhRvXImMsM=s0-d)
Then press "Associate with AP using fake auth"
![[Image: 72909853.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_u4LpDfz12sJsvDrEK7oTQmDBRk51xvl1dhXkU7twIB-EqomG9dyIGaCBrgzGHPGvKFHYS0c889-29XA0AtbArrBtg-Dv2A0EKpdb6sBCVSk57gO0Hl=s0-d)
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
![[Image: 39811637.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uIODkYNTXKAWTNnkhuBiM7LAgyWSRosVRIzTUHv747nBT37dVUlP8h5B0cTw46XkwL-uPvV3YXieePDgWvH8ivEY6e-5PdpbFtcA_PZAybx_GVSTdZ=s0-d)
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
![[Image: 66665680.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tgnmwfy2Rrh5xD4bKs5KlBqvI93oI1s9Gs68zG95bjAQkXbbue1MFHIvgAY5VIBT07dyBLlyaQp_3YPTOf6x8bgGKG28f5YPZZAPa5U8WWo_N-NXAPlbw=s0-d)
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
![[Image: 38943479.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tMeq64S0nq1PV_pl-GzUacF0NihwmA2e82QxfHEcNswth1bqNiWYn-L9A074V7-Uclfb4RJWAQT2MjcwP_2KFYDtKyhhPvXBprOSbP1t9_2dLgB_xb5ek=s0-d)
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
Once the program is started go to "Configuration" tab.
Press "Set random MAC address"
Then "Enable/Disable Monitor Mode"
Now press "Rescan networks" and choose the slave.
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
Then press "Associate with AP using fake auth"
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
Video Tutorial:
0 comments:
Post a Comment