Before even starting to read this make sure you have compatible wireless adapter!
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
![[Image: 86437852.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_t_X-0t78vcXFm6H9r51FBseehgkhpVBUgIcPs6B96dSE097drfZQNvWFNelHthTlnPg1G6zx8n19tw8jxp3tRR2NNOvFu11QxJCUl5dLSVCIQeG-8=s0-d)
Once the program is started go to "Configuration" tab.
![[Image: 79399926.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_ueIvF-gaV6ikyFOMrKeIp8CzjgSgdNaJKsXYoBEbOvH7GgQt8XMSQB760gfqcQ87CDUs0frbAP-kha_8cdc78yXwhrHTT4NPVHDIhlz-coB49se00QRgg=s0-d)
Press "Set random MAC address"
![[Image: 12150512.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uAp7lFm_WdNV9_KDb0cyEKeNh1Zqfl32rij9PqdcaZRdXfApt82rf94GzUXi_elq8s-81LYVQbk61a9mNBdljVTwH7OPdhOBFJJ_dAzmsDZ8kMenJb=s0-d)
Then "Enable/Disable Monitor Mode"
![[Image: 21993618.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_skuG6s817e0_tE7Z1Qr0QPevvT-WKmg1NcN_l_2JbE2N1EM2urtJs4uVZ7nkUkfeT0f0neTsXixyXXulJgy2Q82y36FB3HfJIN3y4ekr9ST59y_atvz4Q=s0-d)
Now press "Rescan networks" and choose the slave.
![[Image: 48030887.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sx2jyzzj21HGqy_wbuLZ_54-xcFHabrmOWdhd6ZQRhC334FAF1nvWKLvU2vaVYkYYTPFweCWVvDUGLEHr8AO66gI2RkZa4sj2e9EU4EgOPRdj8tJA=s0-d)
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
![[Image: 42338878.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uaEzzJSAvztjXHmc6-SnWwl7XsojP33c9sG60EvaxehavEWzGIlb8EL6pkzOXX1MUWA4Dph0MKMtYF7L58V9IL7gTbzeUiZWEhg_6NRAiq3G64znIpYA=s0-d)
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
![[Image: 20865461.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vf-0Nphw6Eui0lFkaZL7yhHGy1PKmvNEDsPoJCQoSTByoGEfct-ZWbiBa09fp30_neAwnqEIKBbdVF8GbTHvELiaPlDzn3-wx2LHcxrKCi71KKHlPGEUo=s0-d)
Then press "Associate with AP using fake auth"
![[Image: 72909853.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v4l7lBbywo_lWf72-tZJ9ciOnFl3I05W61J7n5fslpZMLWMjtf1A981NSe9xDDTaF97CCqQzirBdNq_Q95m83ZEOBOU57bfDEyox4mUYOErMemvLmj=s0-d)
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
![[Image: 39811637.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vKum_xFGOT_aLcZYyA5WROToicx8LcCyijWvr8MBU_AjGPVZXOAOcRHI6KQ4wg1iJaT6R6xc92OQdzkKtOCBNhlblAx6IW_2LEjD27ueFELfOpBXhK=s0-d)
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
![[Image: 66665680.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_t0ODPgWOLfZ4jgu6RU8zsWYxUKwNt7_zJYOVHpt6ZpQC4Hxa20nrAywMDvb2-ifRWGi-x7WBeBWqEtZYkNdUxIuNWE4y89Ie_qSSsCfc0HiXkujnmANjw=s0-d)
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
![[Image: 38943479.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sPHpE1S3i7PBz8no9oH6zx-rT7MyY8WcK-IoJLQKz5_VUBLJAGICBwtxGYb2W4UjxqeV_FxOiy0h1QQzUIcqdjQDo3vGUDC2VxNkn05SZTwWa9s0QT48c=s0-d)
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
Once the program is started go to "Configuration" tab.
Press "Set random MAC address"
Then "Enable/Disable Monitor Mode"
Now press "Rescan networks" and choose the slave.
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
Then press "Associate with AP using fake auth"
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
Video Tutorial:

0 comments:
Post a Comment