Before even starting to read this make sure you have compatible wireless adapter!
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
![[Image: 86437852.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vNMMcGkLbc8uXSyqfLOiL07K2ULPDDBQ-4Wh5vvPBHzVhUdBJAeNcXfiPUe0kZhpYM8Vq625oJh41YnM6DDfT1U-T-w69g_AvpRBFH7myI0IeGdgM=s0-d)
Once the program is started go to "Configuration" tab.
![[Image: 79399926.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_u6-QW8q-4AC0TPIMdy_A4LGaE_Z2EGRE0cFTWIyHms6V2VU0ZqDsxBI5ZWl2jtAl2Xr41tsNGLS9L41_KTCB3J9bRt11-uLCJBJakTeof2yoTUrZDaFOY=s0-d)
Press "Set random MAC address"
![[Image: 12150512.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v77qo2Hqk0d6gApqHqVR5WfFwYqxevv0ceZNHV00J-cGtNk6isbaMqysbm2s8wJW-GjcK0Jk7ICBxLleF2mMbISARyO-1TfOiUXJSq3lsHjqSqVtwO=s0-d)
Then "Enable/Disable Monitor Mode"
![[Image: 21993618.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sqFpnsFihe-ft23teHWrblLifaDcooFcCH90TuXIRCs3TiMlEhDSU9jZ6mso9A3a1f7F_Buhn2LVLmRtM9BfsRUCPxaZBcuR5c4a9OaSYQviglTxm1Vtw=s0-d)
Now press "Rescan networks" and choose the slave.
![[Image: 48030887.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sc8jkJAcjRcUpuD1u_OWWiP67wl7XYY743cPS3SkCeV_CBNaNm4NRn3EHRNSXMqMuaSSHueJ138HlJzhibYrIyRZpW-0RH4IskR4ef7cJ7yvfRy9M=s0-d)
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
![[Image: 42338878.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vtKQVNp_z5GOHbiDGa1tqM0UTp6UoFiQ0QWQ3uWVxp6lSsvjHPr--78mKVTXBF3n5Uqlk1WPHHWTqOV_XRjD7zVMMToMY-0rf2aMTvPaalQVzHdY8OhQ=s0-d)
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
![[Image: 20865461.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sTY7xDo70_SDrcPBLoxnkFwkWTT4KfPrVSJHPqBdasih9Yomqec5yoe-2V75b6xNa_aUgZ1iKcsWFVSNyct-a8G8u5GSwFuaCSbNtDRm8EwaL-LyVQdNY=s0-d)
Then press "Associate with AP using fake auth"
![[Image: 72909853.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vdwkQ8LNbgFs0F7qI4ZOEOrKWdgAsCveWCl9A6bwGt_5G3tugt_C6hfTg07vFanqNn_a42ioOPlDkhtLbypyekFkF7ugmek5mXbFT4mA1I6YchWIMP=s0-d)
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
![[Image: 39811637.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_umRuuI0D2h_qbKxi4eKA4hZOy0VsaBsfISXhPXnHfW1PY-5tXPK9u7SHMB75oO-qMVRw670NEiWm2A3Q4osV8-KStCTtfEYei5LwNdaPeKG8V7u2j7=s0-d)
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
![[Image: 66665680.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vjW22dV_4trIe1P7oaZj7shBLFej20Ci-IZk8TJrLoWBc7744TW3p7UT1fYfgG7B5baWhI1Q1vBQJs8pdbzkzoskp0QkiVFm5vl5E48VPEUlnA1FmS6Yg=s0-d)
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
![[Image: 38943479.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uLLMw7Q_bwPwHuCN56jhGx3oQ5hBdPX_wlnvXt_3Z1WO4Y72hIC_c-r2vwimoyYgMKIzBxKRQUyFT_iwopejTdzMugP1vr2q1g9x8TQMsnDiySSymDkyI=s0-d)
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
Once the program is started go to "Configuration" tab.
Press "Set random MAC address"
Then "Enable/Disable Monitor Mode"
Now press "Rescan networks" and choose the slave.
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
Then press "Associate with AP using fake auth"
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
Video Tutorial:

0 comments:
Post a Comment