Before even starting to read this make sure you have compatible wireless adapter!
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
![[Image: 86437852.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sUBquda8MinbFqExBWKSgcq0qW2VT8QJYhiqoG1jpHRBRk8Zt78-qpVSVDaaBwF6wNmWhKVzxJG9NJfCZViUBGzM56hgyulNQjONWcIsqRQi37SWU=s0-d)
Once the program is started go to "Configuration" tab.
![[Image: 79399926.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sPatu2HcdLtK80Efk9iBieg1uLw73qqBW6aETNYcAMRXWiE1u00IsTxjkuNrGGRebfamhIRYcc30xcYBuLzpnUsInkH7Y1gZ1nfeq5yQkWXuuN4D2WSfo=s0-d)
Press "Set random MAC address"
![[Image: 12150512.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_t1MHbFLKsDrlWRUG5kmOOd0bCMOMyYeZwqqduK19_DENc9eHyULwyykLo5R86R0JdY9LkUNMDhfMRcCa4dTJYGmrqpbJWqYVfHdY_usNcA6VGn7m4v=s0-d)
Then "Enable/Disable Monitor Mode"
![[Image: 21993618.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_u_jNy2-WsNlkCmAHfr81q5TJjgtqUaDs1EVCpEio1fmWOzYYvc96mitDt2UVeGf45a-8S9coknISI2dkjwI6AwLgyR2TtcYOB0H8enkie35HKFWTWF5pg=s0-d)
Now press "Rescan networks" and choose the slave.
![[Image: 48030887.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v28cl8LSsBZi4qzsxoxfiZgF2CGd1mwltW1AivhSewZ940aAt96wfsAMJXiqL85npPt5uiunoHhwMvFNH9Sw92RO8SiYlxPQjvHZZdR70tpHplJFQ=s0-d)
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
![[Image: 42338878.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tDe5-f8BfQ_lTmAOIF-3D01F-F_FC4kwXvxQcw5S2e0Vfa_w_knL5JxAAVoojykSocRffwGfz-kUjh8YHc4ibsPaIzMi_zU_g2EA15PNg9Lu15ID_mxw=s0-d)
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
![[Image: 20865461.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_s_RfFK3Cz-Xhy0mCJHGquHUk7p0AtJzZL0JRwkSmzrKOiMiBbHSBJsuJ7gSXZkbTaG7RBmd35ut-ufbNNkn4qDV4gWjcMBNcpYDUDPUdCxOhT-9qNJkEk=s0-d)
Then press "Associate with AP using fake auth"
![[Image: 72909853.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_viq0gqUjs8mdcRH8_hlvO0bFKthjPUh91StcJImO-SvGAiSC0b8gk0Le-LihlKvmObfYDb1FqX4DpQjrAFJ00otYHYDZnl53TxyWRuLq6VmLb1kGr-=s0-d)
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
![[Image: 39811637.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tap47GzK4zi0aBk4qWT85UYFD6QFHkNCprpuGF_venTHNqvlJDcle4-Rv3tZBtfb3xoWjyfeYjPDKWmgexGAsdoSloS_T5nmWhdqER1Ud8b2fis4Vj=s0-d)
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
![[Image: 66665680.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_u0xnrycSlT2Hmov4JLG4jAgzkpS11mvjfGkJphIMdWK1ni136D4V5pf6s3FSImgX6KCBYZXYkjlLKNOf9y5TSnPug6pF06k2-h-nnTgW7LRmeGGi9w9YU=s0-d)
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
![[Image: 38943479.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vecZ0OToaZ_SKMfvotOmfoM7tFpwmacKkhIw3iVEX-rol_k3hK2vQXyZ-MyQ-T-dyiWSCfpzg5AWhwbQgZRYWhHGPhuMewVWVGrW1HH0MnInuOmFqDSy4=s0-d)
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
Once the program is started go to "Configuration" tab.
Press "Set random MAC address"
Then "Enable/Disable Monitor Mode"
Now press "Rescan networks" and choose the slave.
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
Then press "Associate with AP using fake auth"
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
Video Tutorial:
0 comments:
Post a Comment