Before even starting to read this make sure you have compatible wireless adapter!
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
![[Image: 86437852.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uW3ihH23vbUQi9yb6RssyjAyl4DlRqU61miyBahOmBQVEXjaARiQKFR-ZqR3ucJkHLwNrosRRpL4Bhxzuy0t6L_pTilbT06RwJ8VmQeIbhFVkIGJU=s0-d)
Once the program is started go to "Configuration" tab.
![[Image: 79399926.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_u9Lj1Q_Wqd79qLjGRKpOhebcLFg7ChlZ7zsOsMHlpD4_LvXg1fZh80kcknsTzvisavYrHTCNaqc_8mKLXdFbIpnCoCIcYEflsaaYPoD0bz0SL-S6Q7qhA=s0-d)
Press "Set random MAC address"
![[Image: 12150512.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sKxuzvQw3xjXNYRdEIyb8WHSS6Il6ALri4fJBc7c2YBDTVoDNru7wA80UPZhk5yuXCcLjQx158w16vLcgfjALppIIyuM0bCbh9h2vBK3-H_jbEmoRv=s0-d)
Then "Enable/Disable Monitor Mode"
![[Image: 21993618.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uX6n2SQMjhH9VbN-UnyVA55QqKmCMdAX9nCRztiWl4kuyiUjF2pettDkXzp94QZdQX5unobsqaEQuZEScdI-xL4zYYggRtpsVC1-IWUG-1Gblj3LocdiU=s0-d)
Now press "Rescan networks" and choose the slave.
![[Image: 48030887.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vmGpsqJUvZJgQVaQK2oSjKdPf5NMbi93KdvsVBaySVdKJyTpLfxRku-S6QuFDwO4yRwY2KeOhSEvUm1gmwTvHe1CsqK3STszyV5G8Mz-Fy6SREAZk=s0-d)
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
![[Image: 42338878.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vYuaOUtp41keWYolx_rFW-_BaEBIcz2Z_7Lh1r7lqJ7MzizpdRrFHzGQfgl7El4i2T_hLzqbA-eSOQPsJ8x2rOZep-hE3BzFNGpsyTkPoisU7BkNXVpQ=s0-d)
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
![[Image: 20865461.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tbfZ1lBl3RSZ2284y2H6uYiV0kUWWaXUxZt8GFSHLpUytZLrrXOc2cl2PZYIRI8F4d2HTSnBm0AAjdmrCTro5sFERo8hI_csvQo3p00HR2a4Lw-5u3M08=s0-d)
Then press "Associate with AP using fake auth"
![[Image: 72909853.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_umQHXmPz5Xx3-NCG9Bo9jekHpDdrAwWjmEY0n64PDV7OVYjZA3xZsHQdWCID8sXtZzrVJh5iZPX7E2Mc23-fvgmX4SYdYCLk9xherxiq86MHbzTSid=s0-d)
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
![[Image: 39811637.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sxzTfnlHXV1VBI8I-VIyH5iKX8Rl0cRU2w7TTWGRpSJSoWw58so1DoH3qThGlwCIxuGCiI4iU5I7G-QYTvptjBdJkNB-XsPzKSwNFxhXqnG2U0ODuc=s0-d)
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
![[Image: 66665680.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uad1ON106HBSpB3rGbusURToKfC4jhlhXLEySiLBY5cGONkTOTT-0ekr6RKXkitn9z8MiwviNXH3z0YfpOUA-6EQTwQdAmHwqnlP6vhFzyQX8ocLJyrtU=s0-d)
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
![[Image: 38943479.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_silq4vDiH9slL43IeizvXfKqueEtPKbs3lINvHVUUKvP7yLCgERSdJI7LuDNGKxVW7rpk5-PZzhqeDMTbn7UxQNnF4W3SB42HbQuuJuEaN44ilui-6C5Y=s0-d)
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
![[Image: 77928950.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uA9xfmrohOSqkp9ncSvqPPa1tDeWOoCTAXoD6kxbgcbiH-td56o7Pt2Q4p6D_666Hq8VCEWnwrZl7fuz4hD1kidpYP_PdSXRy8vrKEtqLrHyxTZh8PUbg=s0-d) 
 
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
Once the program is started go to "Configuration" tab.
Press "Set random MAC address"
Then "Enable/Disable Monitor Mode"
Now press "Rescan networks" and choose the slave.
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
Then press "Associate with AP using fake auth"
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
Video Tutorial:
 
 
 Facebook
Facebook

 
 
 

0 comments:
Post a Comment