Before even starting to read this make sure you have compatible wireless adapter!
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
![[Image: 86437852.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_u8AFJgxoJS9kAH9vAvwah-KlZkk5W8bjsOen3NYj677Rp7VNymZc-oXU0pa-7XxAIsGE9pgtVrk7qXy149zdubA1c1K8prbBvZkiB_uu4RIacIcR4=s0-d)
Once the program is started go to "Configuration" tab.
![[Image: 79399926.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sr8ytAL0szvU9xe8Sd8S7AiYeky7fJLw5NVXkbLSo78pA1fE1Tz6CXFlhORN98mjxCPvdj6Ct3-c2c9Hull4fTLirKNZl_o6Gefzc7ckVdk3KrJ3ZoR4k=s0-d)
Press "Set random MAC address"
![[Image: 12150512.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uLq2aVEPWdSJfXmyQdHV_TtX9oI5CEEQ1W2f6tQwu0TNr1xAfXskRLjTwy4b5haTU94n6JxUTZaZyRv70s09lRZ9PVC3vAMn9Gs086O1QyUqbPp0Q1=s0-d)
Then "Enable/Disable Monitor Mode"
![[Image: 21993618.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vgMp6IIYDFihOc7cEdBg2AkrH2dIdmcNYoHCvVfQ5R-o5K8mh161AOVC2x9Wh6zGLNn-cYsVN4IkUycTynrGEkCWzhxTcaA1W1dhIHIjITzeJUDuDpTkQ=s0-d)
Now press "Rescan networks" and choose the slave.
![[Image: 48030887.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_s9gXebyum1eV5cUqyjQLyVt7GLMA9Be8QmsLRCg95T1kNrvgPbAjnzOGG-VoDdXiT1zbFW7BL7LMiVz00CkIza_4tQhDfZzfXLeXI5OI6d8o9QW_Y=s0-d)
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
![[Image: 42338878.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tUnCYpOTdvUbKrTxWV7JZdeMlhmWvuEoO1xgNgfH97m_tAndKbXPYCmuI-6aT_E4VJlMUKr1t34t0PwOEyNjuDUercl0NimrVCEFagvy1WRlH9pOq9bg=s0-d)
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
![[Image: 20865461.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tYMvw-EzBhQpMUyUD1gkyLDgg3BxmBRboGKvFtxXDLmOjNbD0ApadWoqUQum3DPEHc5PU1kUma5J-JOjGw_cXKOUTdWYvYs91yYDnGoXbIwoMuaGL7dV0=s0-d)
Then press "Associate with AP using fake auth"
![[Image: 72909853.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uDsxecPHUWHL6_ZKigOCm-RCQSW_jeginENHzOGsyJeXbV5-XubWWWOyywTtlhCPHCS31jqexldKCcrL0MUpUzlSeAvH5ShHLHhqMYe5nXnbVekelg=s0-d)
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
![[Image: 39811637.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uKEtI3P1WQOvJb1SkaGoHm06apyUl_UwWH_cWpnCqb764fsauWgvE6GcdCPjSFb19Gmj_Myuf5tJrCH1EnUd7R8OH-nxslH1wrajhLh4emQnmiPqft=s0-d)
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
![[Image: 66665680.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uzmh6N5hwam4M8tqLwJ0aPfHTiEBf5CVaoUfjVX2Nc9n-ztKgs3TTubVEIWMIyAPixGwNCw85pVbcfajEIOnmaLdOJ7QMrxWsx7ejuNnkreN4B0N33MaM=s0-d)
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
![[Image: 38943479.png]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_u63jd8XAAEO1cdHlTvMNOAFdA77xdBtehgpBVURMqSXp9RmOFPbkMN1HM07IDjzXdIewhBDL50e5117gYPow0k8a_Y673Ni1pgNfqfPxbl2Sf-df9PIwM=s0-d)
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
For this tutorial you will need backtrack, you can download from here (I am using Backtrack 5 for this tutorial).
Once downloaded you can either burn the .ISO to a cd and boot it, or you can make a frugal install using UNetbootin.
Ok, when you successfully start backtrack go to Applications > Exploitation Tools > Wireless Exploitation Tools > Wlan Exploitation > gerix-wifi-cracker-ng.
Once the program is started go to "Configuration" tab.
Press "Set random MAC address"
Then "Enable/Disable Monitor Mode"
Now press "Rescan networks" and choose the slave.
Then press the "WEP" tab, you will see the "Start Sniffing and logging" button, press that. A new window will pop-up that's airodump console. Look at the "Data" you will need 10000-20000 Data/IV's to crack the wep key (Sometimes more).
Now we are gonna speed up the proccess of getting necessary Data/IV's. Press the "WEP Attacks (No-Client)"
Then press "Associate with AP using fake auth"
A new shell console will pop-up, wait untill it asks you "Use this packet? Type "Y" and hit enter.
Now press "Fragmented Attack" again a new shell console will pop-up and it will ask you "Use this packet? Type "Y" and hit enter.
Wait 20-30 seconds until you get enough Data/IV's to crack the WEP key.
Once you get enough Data/IV's go to "Cracking" tab and press "Aircrack-ng Decrypt WEP Password" New shell console will pop-up, when finished decrypting it will look something like this.
Video Tutorial:

0 comments:
Post a Comment