Before even starting to read this make sure you have compatible wireless adapter!
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
![[Image: 86437852.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_thK9L59PD9eclrvsNtXXfdgGrRJkelPuu3axt20O5E2F_wqC3pQPyItpWVCIKelpF5BaBRoqofdMoQEM2PfC5IXOwv8Ws7zjpAaheC3kSR0LffocI=s0-d)
Once the program is started go to "Configuration" tab.
![[Image: 79399926.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sZytj1G1pfpgxFY8p6r-n-jNz0bTUOwlyVi7vcVEpujcNXg0vjLAdRWFIb3PT5lghjrjNTdS82t7jKCgmLpdEnFgxzh9Pw4Qu4aXOJWwfy6vYuYDyXNI8=s0-d)
Press "Set random MAC address"
![[Image: 12150512.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tp3gP_sJWv-kOerEnUSd0h4N0PAbLSyvcVoGlSEp3zr8KMdsRxrzL1-hM-a39z0QnKPWdw4wpwtSMJYybMhU61gaw8FwiiRYOLxwwJpbW6UlBiolud=s0-d)
Then "Enable/Disable Monitor Mode"
![[Image: 21993618.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_s0I0jD3l_T0YYBD-a9sDnRl_kMokbgOcyPLL_KNze3wYtZgCyol4uyEiPejdNY-SsLew2_621Gw3eWGidMApSh7iUwqRG6hd0SdlmR49BRN6oDbl7fBeE=s0-d)
Now press "Rescan networks" and choose the slave.
![[Image: 48030887.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_u1IO1H0D2MHMSGa6f0imyfuEJEgT2X3Cu4GXDcGp5jM6pIt9JfkgiV1DR4lk_C3CsrO42k7OWoughninBpn8xK9vUVCLnsdhmpF59m0MnJHQNyUrI=s0-d)
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
![[Image: 42338878.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tND-Z5G_spqbY0nnMMsIOKYiPdMuKCFJ81SkXVTuJi2woRSHy8LJvd8nrjGWSgCDKjKPyLP--JSdJ0gwef7AcEa6m8wID0HNvKQkklmMLJTa7oNDT0mQ=s0-d)
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
![[Image: 20865461.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_steqD4KYth1UBnmtVaoIjDZ583_PXzQznmLIgaZ2W4dfkrEv8lYhDCUYURSmVhLonmDwTqfO1FDY54RcHccapaBL1hSMKg-5KLrWRzkH8ez98AC5WsxTI=s0-d)
Then press "Associate with AP using fake auth"
![[Image: 72909853.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vvai4gIpXCdSq7meAtBoighqZy4LMQ-qZytePy57FbQthYvC_lBBtgTR_gOw-ydXAxG5MkuHx86_Jp4J4kDnrDaHOy1GmFjIsCpYjflJZIWzJ_N2SS=s0-d)
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
![[Image: 39811637.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vNSrPoWAhynJOfGUlX_C2FxailzkER11azAMxV8CBiuLQuEOhOwxf0oYypym73q1uVaqa2heUFt7b8pMJHaU3IGnOg58FkA91W-6KQHB2kQHd5TxVi=s0-d)
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
![[Image: 66665680.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_voBCIMA5YJyozbclFUGg0MhExyov4zk0X1dLXqXDIVhdug67NVBRm4EAEnNTocBxZXeXWxal2vrDvxJcdPIIh_wglEr7fg-rR-xB1wpxNyOaMGQ1Xuz-Y=s0-d)
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
![[Image: 38943479.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vZm2DGGFFs-i1v4PSbhOrsFSQ2YWMgJJH4_2-NZVQRF1FREpzceXVNxTFMVUrBS4QGEUdbkTJQwE135RGDVi3WecAlykkQdOUyoMzs9sk-3GsVFXzN9KM=s0-d)
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
Once the program is started go to "Configuration" tab.
Press "Set random MAC address"
Then "Enable/Disable Monitor Mode"
Now press "Rescan networks" and choose the slave.
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
Then press "Associate with AP using fake auth"
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
Video Tutorial:

0 comments:
Post a Comment