Before even starting to read this make sure you have compatible wireless adapter!
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
![[Image: 86437852.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uM1jyZR6tKVY_Se-UZUQ6P1yet9xvP_Uiq-91xXUtlK7DyYC4-m7ymZlj2nQ9j4K8b_yKHn3I8LqkpwRV1osJTn2ygtJEKwDiuo0V4RmZ_lr3yeIM=s0-d)
Once the program is started go to "Configuration" tab.
![[Image: 79399926.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tV57hGh4eQXU0ccB2xXN5zQx7d4rhY7zBNqGjxpdqWiLXVocodzyjlNeSpyJw8EEzFUZrA2zDvNLwSwV167aE-KKbd4_PWvQThVSUz3l3k72j1wRdIUmU=s0-d)
Press "Set random MAC address"
![[Image: 12150512.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vryD7IaSwqwhAeBdQUUvkiVk3jqkPbdd1ouNBwIYIYoZNxsOD5TGzYuOLl4vpT2ve7q-SCv60WphauswT9SOIPSPBPT1e9ipCDLkSydbSrLI5J79lC=s0-d)
Then "Enable/Disable Monitor Mode"
![[Image: 21993618.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vnzEefVZ_5tftn6n271QXBP6tlCTkny74LYJds07cxPKegfDwPkwTGwI8vAR_ZZZ8SRPS88bmzdWFUiPpVh_IDiKT8u-EVICfXcmjGOg5LxnTcCKk2pxA=s0-d)
Now press "Rescan networks" and choose the slave.
![[Image: 48030887.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tQB1sH4BT2tgwLd1c_iSQbHaUwHeTfwDEBH7aUv0WA9vYD4TYrgprK6QzEX_86rJADdZKJm457APQQOPoDYPid9XbBTt1qwjDRY-BoiyUBuFTiYEA=s0-d)
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
![[Image: 42338878.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_s0x2RfAbqqKLmFNiX7zdRAZfVeKnGjJ4Azp2rdqSQXyzk7PT4mQdUJuMp93T5z61EsT_Wb8du2dwtlSTl6rDz4jSrjSWETJ9ky5N_6_7Gww72uoVJbWQ=s0-d)
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
![[Image: 20865461.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uBDvKSKOO7P8N4ZSzEaD86oSKf730ocFDUTIXPVCMGoVvTffKi5h7dKrYVJmAQ0uyk03f25NPBjCKeBNGNOV8PriwNHXd4BnUo24PJmOTPAXHl14-K6Uw=s0-d)
Then press "Associate with AP using fake auth"
![[Image: 72909853.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_stl77yhVaa9l9IXqnUViMzz970g14XBArYOtFJRzYJtcgAqAk2jZmC24rcJlRyFHC75EGsqYgchUQ5nRPLxclTwS96vExV4ePGYBRQYI0ezvYrvXdA=s0-d)
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
![[Image: 39811637.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_s9N5OgNF3BtKGEIvocE5cSCvH-Xd407y1RhkJX5zB0jnYHK5mvPwbMhtWw6adX9s-PA-0xVfuKdJ32T1luXPvbP6Z70WmxKYtS9Wlwag7xLfDSEbOl=s0-d)
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
![[Image: 66665680.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vRdOj2lof5JEJJgf6kCh2wB3LHtvShQQsdjOesORneqpTiWt9-XRdKWUuZ7p2pxuamj8OjOPF4Bw7oSrcAYzB28Yq0CzqyHDooryaZETeFr50xMGoie8A=s0-d)
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
![[Image: 38943479.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sUwfTbJgly1ky0L9r-VfE1mJ1geYfim-FKYT-3LPvKHd-d7Y9A2XNTAF9aO-k8zpRwCGaKVmAxdjCVku_J8YlI7b2bpXITadcHtv8Vi2efxRf_m_Fijus=s0-d)
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
Once the program is started go to "Configuration" tab.
Press "Set random MAC address"
Then "Enable/Disable Monitor Mode"
Now press "Rescan networks" and choose the slave.
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
Then press "Associate with AP using fake auth"
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
Video Tutorial:

0 comments:
Post a Comment