Before even starting to read this make sure you have compatible wireless adapter!
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
![[Image: 86437852.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_u4JQKCPmJuCdoa2eveiXlN6f3ZrqlPEvB7nJ5zJOy9xAlyQMmYdU3jM8DBV_ZG_FGtZB3IwvWlWtkqdksLnWqBFzdjONaGhlSm96sUfmUBMxMGl_4=s0-d)
Once the program is started go to "Configuration" tab.
![[Image: 79399926.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uUMAmYlgtRiqTHifZt8I5M4Oor20pRQI2BNIFhN5F78roSGO20f-05j8d_ubonRxISwhJdaXOpEDfMHaxDXCb6xsedc5jJyMGPAtjCjDDRwzOSgz1GC5o=s0-d)
Press "Set random MAC address"
![[Image: 12150512.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vf7X3AJ-kK1VAgKcpjDeOSWytMmMh2Atidg7kv6PdNggkK2IBF7u467UYuNVcnHv3oUN8zcmYyjX0ySehwQ8JMAdG-hS9L7TSUYEj1p53o3JMBEv65=s0-d)
Then "Enable/Disable Monitor Mode"
![[Image: 21993618.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_t2Ijq32wm8v7Vye9sNO4LPJPAXbO5it8AdUxz9LCF101Es_p4AnvCJIIn7jTMZO5FnEBwjsTrD4wEamOEdnXjv4JriahAT3IBnegatAgP9Y_0lYBrUxrk=s0-d)
Now press "Rescan networks" and choose the slave.
![[Image: 48030887.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_slnDjX0AVwmuInpWlFoxkfW_MV7pVWVGc6PTAFLAO55TUCZalXvKRmHhlt_VOJbpKaB0JkGpUCJg44H42uT8BazjhShO-Ph1MEEJF4Y5BSGeCzmsE=s0-d)
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
![[Image: 42338878.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tMWLBXta3jf9p8PTqrV9tud8WhWZdoz3GY_-ZUCtnWqSgBE2agyN1iZF2_KKhIG5ut9YMChDKVsFUbFsK2XrLw0lbVXGfdir6HtVtk0bvwBnGxaj5sQw=s0-d)
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
![[Image: 20865461.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_urSGEFfNejePmfRzJI_arQhgKBzDhBboTEI952jfQrZf3DKAAZAdC9lbl8q36UFhrQD8gRWioZ1whtGskUtE-AZJebTpz2DvGs9SRVOsDA44Es1lJS5Bk=s0-d)
Then press "Associate with AP using fake auth"
![[Image: 72909853.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_td9aqQiVGi6gK_EQgTdOsYhfSBTKsczmQLxPIIH-xaDooflm3mZvYnugeIHiNuzhXxK1M1pZ-BWci0Vm8vkCp7lD1S6HDYuu7J0sUkomZgad2q1ujX=s0-d)
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
![[Image: 39811637.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vGW5hNKke00tXpTmK6zMc261LilApeolkU45VXzdbb_9b3qDiwAcrOIV_A261KTvRISWqMWsP7T6FFIouO923XJm0v-URc-_MC88qoQtTFHBD5r0TV=s0-d)
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
![[Image: 66665680.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_u_VxZnpPwCEKFujukPfFx9n25KixIqZSRfL9d3c7cOVoie0N0Tp4XV3cTF1K7e9GjI3eZcl5Y9MLjpl5WZPR1YF8dYLtlyRtk8gt64aRKg_DmrYaJ7w6Q=s0-d)
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
![[Image: 38943479.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sOm5CsUOtxUIXRPFWsqHmXhDFe9EiP1PzT5A2-yqdO2DQ01VW3YQMs1VOE_tBIfk7xzPEoFnPd4zET9WY8CHpc5O_jPYr8cWy4ggnrp0iR2VOZWhzUu50=s0-d)
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
Once the program is started go to "Configuration" tab.
Press "Set random MAC address"
Then "Enable/Disable Monitor Mode"
Now press "Rescan networks" and choose the slave.
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
Then press "Associate with AP using fake auth"
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
Video Tutorial:
0 comments:
Post a Comment