Before even starting to read this make sure you have compatible wireless adapter!
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
![[Image: 86437852.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tH57WrwgYbniDbgbY8UlC_bWeIA1r80BMXDRv68NE15Txdqz-rgHdsJJHlsYuhUYh64-_kiPTVwHii5Ys7dBxzsO5vDTIYAvcMjyJQTgCn3jvTdtw=s0-d)
Once the program is started go to "Configuration" tab.
![[Image: 79399926.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_skvJ8D9fWLtfdnMH-GWTJUQq2yn5fXNSBUwIjO8Uo_8hOQzg1mXOVWx452kPYRLhfHKMUPw7Yv43crga_CdiZGPswPmKd99UBEqYyxtMALr7g9NBajaHQ=s0-d)
Press "Set random MAC address"
![[Image: 12150512.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uZxzlVHZd_UpoDekSaUcfYQHY1OK1IkdH53Gm2R9sgwWb7F2I5I0lrhWLZtvOkkt_Fy60DT59IZgp4qlVdQ7mNjM5OlH2uGLP-GdEJkVLKefNma4b-=s0-d)
Then "Enable/Disable Monitor Mode"
![[Image: 21993618.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_t3fKz2EEH_0wcl8FWZ5iSVEerckm5EAff4-HI873WxWyAyhcUMc4sHqeIXdawLXUzJgcI_8Ol41ovPDpEcGXnl1VddJuto2T6jD2z_qnxX8Z1Twqsq_VQ=s0-d)
Now press "Rescan networks" and choose the slave.
![[Image: 48030887.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sUNFruc64l-Dbps7u-JE249XRk3oPldA-um6sFfLha6gykV57loMfbN5IQofC6vqeBtAyzj4LCyPJ_t4n-oq4Vg9YNH9kEuKYqBQMR6SR54UYLXzc=s0-d)
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
![[Image: 42338878.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tUTCl7C1BlIaPjDUihH6jM-b8sBfgNzvs9hXLYwhu9_RmWithGtSUggvaVn61PuECvcvTJppdhxFUXWSTK9zzAHqq1L5gdOU8-yogo8iXI-pAgNUmzBg=s0-d)
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
![[Image: 20865461.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tFAWt4qqqY-3UofbB1jSRcYCjlPTA4W16hNnMl9codkFb3CHUNPLlLqVQN4OtSqMAtflUJ_6F-a1voF2wmBfSJOYNkEMERblxdjn3cfHSB7U4zttGA4k4=s0-d)
Then press "Associate with AP using fake auth"
![[Image: 72909853.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vIAC8kLzTLbgHRdFPmnJVUPZ-VcXjZ2Qwk4X-yrEI4MjhlyVwT-rXMq1PpOwqeEGCQJT91NXvoGGjy44KW0tjO5VueF0KIkSNiUIF2YYytXzHbCgxs=s0-d)
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
![[Image: 39811637.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vmAi0Jn2PLie3C4UmQybDsmVM2_Bgx9uJYBqsiTMC4PoPtfDRF5RU__TL-kC0lhsIS4vwUDLrj3VRybPdhnbayARzQsFE1xwAC0sCUTmCxHxTkoAPK=s0-d)
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
![[Image: 66665680.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sTXeG7lTC_1XMrRWpYwRZ6WawKIzV51oPacmjWcmcUXY2088cplJsQCRoP8wBVCC1KePyBAhu1R2gs1O6mIGwOw8wbXkaVc7d_hx1syJ_RinyEEXRpd38=s0-d)
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
![[Image: 38943479.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tprUJjBcEzpAw7g6L4dbHEqgaKSZ0RxmzDgnE9XDqejDREU1QrDM6v2iiCDn-uJfPSgW9-jTQBltOBJg7hux3iuvzwkBG_2klPXbt1a9IUogjUXYc6yc8=s0-d)
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
Once the program is started go to "Configuration" tab.
Press "Set random MAC address"
Then "Enable/Disable Monitor Mode"
Now press "Rescan networks" and choose the slave.
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
Then press "Associate with AP using fake auth"
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
Video Tutorial:
0 comments:
Post a Comment