Before even starting to read this make sure you have compatible wireless adapter!
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
![[Image: 86437852.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sGT2toGrFiCtVrzv-M5RX2dJ96U4evWbjJRsUtUocMErbOzOg7WXAkzA_BMoLLuzxspXLx_5_tB42_6ZNRaf9Rf2eb8WfRLzZHdsQ0mUw2PT6Nk6k=s0-d)
Once the program is started go to "Configuration" tab.
![[Image: 79399926.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_ufKfLXGZo4gvXaEHsZ_E_prABAHrF4n9c7i6YXk_VChZy0GsfsSbkVenYoD2CosUh-YDJN1gJqFh7cPE0ueyFcotuLT8KfAu8GPWLcdMM0rUhPUCvXwgk=s0-d)
Press "Set random MAC address"
![[Image: 12150512.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_t48WUBJ-Ly3z_n8me5OwuKIBupKjQxKjk65W6v0GS0tdX8RilhAkeL9_BtwmkbW0fS12vQ606ia2G7s2MrwNMY3B76A_4-YrKQbsKt73sWye8yXhNh=s0-d)
Then "Enable/Disable Monitor Mode"
![[Image: 21993618.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_t0I44z9FCQaFUN_KkyAls8P_x6xdyCwjFuux8Q56_0YYNASmKZi7bsJqIB-jsd_vtPLQb7hllmsYOpzeNfbCnqGoTKu4ekOt5diHuyff6bcA9vvv7ou3g=s0-d)
Now press "Rescan networks" and choose the slave.
![[Image: 48030887.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vTuGLS_fxrFRsZMmC6N8Eqxf9iUR8xpWEpo2xqFGblxTtY83uojfePe5cAyKjozfwL0CjBNo6GEik0kAJ_4-adiFL1AfX4-H_GBP5jhZDXwR_dRDI=s0-d)
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
![[Image: 42338878.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sdpAbxl9FwWGq8QjlQ3yzBtGwalMqQi2JwSCYqMcIh0PFcJG-kPuZJz2sWyk-_ZtVjiUVV0gIWfT6JR4RhC5oFm3yrgmQeDLFfF6mqa2VLdfbZPnQJmA=s0-d)
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
![[Image: 20865461.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_t-pSDIuNOAxqrEF8vjTRp4gwcXLeJPy__8yPC28YADqi_mpFHk_fhwT9V4BDLGhmsXfnEuXtoHNXsoXLqYTLlM3A5ePPndCbC2MjE_hVevGcqAwlrlitw=s0-d)
Then press "Associate with AP using fake auth"
![[Image: 72909853.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_verZLPxtRV5_dkl05Kqmrj7mhGFbXSMVsNxiXpw1yahlh2R5QS75nFLdHpiIbMMx3LUMz_rK3xB69uAWabItfAcN7LMrxjzD4-v9tw5U9yUAZ_JML8=s0-d)
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
![[Image: 39811637.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sxHplKOo1B3rfm2i2AUEJ8nxdj92JNCLopw1Zme585KHzrLSpW3sajOdumR7xv-JgyoyM5oCLnW4nw7I2b3Ulc1OyVR3GzzjXXXzJplPJW1NQBXldD=s0-d)
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
![[Image: 66665680.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vmN4rCFH6IfS3kpwPHNSaQgezx-VJgTaeAUFJSq2atsLa8xTyOvLFecAyMTZ1FERJKiAdLrzwJGGIB6R6YIFcbWyAU6Ept6rVAbx3VLEzJiVxwKZxOBT8=s0-d)
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
![[Image: 38943479.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vwQcvRubQ2yskzUitlJxgNmjCUDI6BkXfCOwNTx-pD3wwXHzqStOh3ipdUmw-sb8VSlu7Uu3mitVK9e4IlIg9zwJMhFmvNZVjG2iZKGelHvNeJds22YtY=s0-d)
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
Once the program is started go to "Configuration" tab.
Press "Set random MAC address"
Then "Enable/Disable Monitor Mode"
Now press "Rescan networks" and choose the slave.
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
Then press "Associate with AP using fake auth"
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
Video Tutorial:

0 comments:
Post a Comment