Before even starting to read this make sure you have compatible wireless adapter!
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
![[Image: 86437852.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v1CZQGuFCzlxlT09S3j3vyJb5oH_6__s3PtlYtlJxXKAInOty3tpK9X7DsOCVgnEQ78qmQQCEv98E3KjkiqF50uFDKZsAhry825eqUB1QtPe03KPA=s0-d)
Once the program is started go to "Configuration" tab.
![[Image: 79399926.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tBe_l_PYCeVVfO2ij0l-Dbzws898hQni2z4_2LlSm1mWJaK3skURV7TfWkOXloSHpaYigeghTkqzhakFSMO-K_cVerv-jcKCKEmZqibrr-O0EwVVTo7DA=s0-d)
Press "Set random MAC address"
![[Image: 12150512.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tQgx-nsUUfSWnL_4ItUrxbjvqmI_zOYGpaugxVZ8Fhr5U_KlvGFhONAPSgeiIu2aCyBPKrz3bMlphggrFXfn7nWdqRK_crSw_cUkRKXwA6Cx9nIXXv=s0-d)
Then "Enable/Disable Monitor Mode"
![[Image: 21993618.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v3tYU2_MxdjOi3_55b7VZwMCf0yeUGkW1L42ltUQxxZgNE7LAx2nSrdIzf1f6wPE05YsbxftKDb0Q4tXefPEfEUOe7d9r6CWxnsFcqmuOtWKaAmK5KOjg=s0-d)
Now press "Rescan networks" and choose the slave.
![[Image: 48030887.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_um4UwY3ekTCBtedY7XwTD9ih4nkxlHjXyJPqtXdEDOskBqfo1TwWsWvks5TgufU7XYIObaWwV7VkyICp12ww3VI-jjll5vnpMb-rR0oCg6Uc0uaWg=s0-d)
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
![[Image: 42338878.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_scWORwpJ7S6XWoBeQxbC6D8vDy227La3DrwHzU8aWN7iXSsfoiz-U32qK4u81tLdUT20tKWWh-nHlKj9tJJn_afZT0zA6xggxBv2I0Arx5mPWCCTH3Wg=s0-d)
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
![[Image: 20865461.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uokf9YBeuBzTY77J2rJZFUpOCTUUFZ8M70R09fX6ZsN4EceLpNXbagEPP84o1-AnViG0es_kEDlk9NBqfLKB8nj_X7NaCy_QlfUsH6fVfo5c-VAu0typg=s0-d)
Then press "Associate with AP using fake auth"
![[Image: 72909853.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tcdw8vcLkvqmPG7vUxNFvuUIiBA_TebFajCGdwAsjfaewQ5TiwVv_JXz7coq3tmj7G9mh4EHb9ocOsYpvG2XYIMJPjBomqKt8aYoDaROqT08ODOfDe=s0-d)
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
![[Image: 39811637.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_snzXPX10Zu20fJPyx2Keg1jimQyBb11YuIF3yXw_xBaxVHpkie2TlGMHicBBqEGSDiBjE0ytCr7A7oB7bJEZmOBMaG0j3bSPFHS78ROs-99JcWft23=s0-d)
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
![[Image: 66665680.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_swS_YlhPJoCXHIgWqOV4MV-aKNmhsIrj5kjqIPEcAynZBkhfl4MaLozMdiyXbjgWTW0fviWBAWrkG8WSWRte1hiXEPlGpnmGbCUwk_aZxikHkc4-z_8G8=s0-d)
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
![[Image: 38943479.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_umoT_L3N5ZwdJh7TR5qipsJAwIZlPfB0d4_0DG9NqCu_UFG7YVkzOhgse0ywJFkbVVegSgTZ4xYiZmTqhk1T0zp7fqGpkADDeLfCkUmYTb4Hsknu7rvfs=s0-d)
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
Once the program is started go to "Configuration" tab.
Press "Set random MAC address"
Then "Enable/Disable Monitor Mode"
Now press "Rescan networks" and choose the slave.
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
Then press "Associate with AP using fake auth"
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
Video Tutorial:

0 comments:
Post a Comment