Before even starting to read this make sure you have compatible wireless adapter!
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
![[Image: 86437852.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vMZMuAEQkCVm4Cm8Hv6eQ1eUJ_Mh2rZP0N5SRab67tjvTGeqSB5VKgxEkc0RaEivC5w389hw4WfURwzxX5TObZHdNk527BjL1k0xQRfG418KP_NbU=s0-d)
Once the program is started go to "Configuration" tab.
![[Image: 79399926.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v2UKXnBdxZzOkgMHR1uwc9b7mHlvEGSj3Iox6U59VyFjgmA9txXZJk6cvWnO6JyQ8TXAQVk0lcq434vyGDdblSlSbF_2Orh-4hkcLD3QckciNtcuysoX0=s0-d)
Press "Set random MAC address"
![[Image: 12150512.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_t5nIvcQ-jc4nPtjjHIz2eKIwNg05P-yniy2ZboUT4Xc3_LaBqYzfhaJJ51rHpUVf1NkzlRek8MkGeFPlboInhv1er0wPHSAu0QuOkxNlzBHOJIugWh=s0-d)
Then "Enable/Disable Monitor Mode"
![[Image: 21993618.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_u9Dyxk1ZCFWFJjPg8IQz8hBH9NTpAv8e-V4hYrsvLO8dQOm5_RjBvBpWIJr32hY-X0SucEshRH9eDaVbGsA5eLMIin3EuiMzaFBjdELZQY0sVlrbRFEAc=s0-d)
Now press "Rescan networks" and choose the slave.
![[Image: 48030887.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vXeAukSzw4OIdCgJsXB1XIRQEGm-_cWt60NkqgiVlwSve1Q_JAo_3_cbejmNV2bgd9BpFWjNpE8lVWyb23DbtZesKC6wgaCOC27gXM1uCvm3tWGGw=s0-d)
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
![[Image: 42338878.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_t3vmMnc0QPQIKYHctLsXUi-apgbf6YpWPWZVdYE1jbCjf8cfBiCVu_8X6z6wX5EBZHDBT5cRnoAZPjA6gwdLSHSJAzGNltSEqMTIoyIn227OLs_0uUAg=s0-d)
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
![[Image: 20865461.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sqArEH4vNiDrleua5Hg5x6HDF8MKUEEkx9QKI6WjZl1Iltcj08Go22kBlsPxhJMNNwXnCCtEYQdnp5LkJ9jctoM84UKWLZSO_bPjBPtG6LvtcoUDSjoyI=s0-d)
Then press "Associate with AP using fake auth"
![[Image: 72909853.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uIvfQ8LW61N63xinQKk8gD615hre5U-gwhHAnZGuLfmKlnhh0X0W7RTTkCOGlPtWW8al20AhdGulLq3l6ZfnfYj-bo7ZWwNF456XYRsguwHtom0_fd=s0-d)
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
![[Image: 39811637.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_skvcC_HSWjz0V3w9v0q2IBVZokIPZkv6Yj-oF-JVBmgloSLj8qQG7Se_ddNFYhTp_qNudn7IpybCUCCY_Gt-7d5Y43YfRw1Ml1WUr8LhX_hAJs7Ggt=s0-d)
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
![[Image: 66665680.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_s5CUclEoaUVZn11InIypN1x3S4gIZdzAlElpax7xFe3yUk3tNEElbhJPiY5h-mN2GAxy-jxQ1BCpOhuVYSPKzHT2AAyaZJe_Th8b7HTZD1dd8IkwJU7oM=s0-d)
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
![[Image: 38943479.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uh3bT0KwdjbszMoLT2Gt6jnH_FPNCrXkbRPusTiF5EbO0KiVFQF78txOwRpI8t6IQSc5Ya4nenNaGVWsCJ5Uk_CrERnHXaDIyRvoAZoMK4_pPkLRJpK_k=s0-d)
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
Once the program is started go to "Configuration" tab.
Press "Set random MAC address"
Then "Enable/Disable Monitor Mode"
Now press "Rescan networks" and choose the slave.
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
Then press "Associate with AP using fake auth"
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
Video Tutorial:

0 comments:
Post a Comment