How to hack wifi passwords?

After the long occasion, first I need to say Merry Christmas and Happy new year 2014 to you. Today we will find out around 5 Steps Wifi Hacking – Cracking WPA2 Password. A great deal of perusers send numerous solicitation with respect to how to break remote WPA2 secret key in our solicitation tafter we hard reset the entrance point).

Prerequisites:

1. Remote card (support unbridled mode)

In this instructional exercise I utilize ALFA AWUS036H from Amazon.

5 Steps Wifi Hacking - Cracking WPA2 Password

2. Access point with WPA2 and WPS empowers

5 Steps Wifi Hacking – Cracking WPA2 Password:

1. Open our terminal (CTRL+ALT+T) and sort airmon-ng (view tips and traps how to make console alternate route on kali linux)

5 Steps Wifi Hacking - Cracking WPA2 Password

this charge will records our remote card that joined with our framework.

2. The following stride we have to stop our remote screen mode by running airmon-ng stop wlan0

5 Steps Wifi Hacking - Cracking WPA2 Password

3. Presently we prepared to catch the remote activity around us. By running airodump-ng wlan0 our remote interface will begin catching the information.

5 Steps Wifi Hacking - Cracking WPA2 Password

From the photo above, we can see numerous accessible access point with all the data. In the green box is our casualty access point which is my own particular access point 🙂

Data:

BSSID (Basic Service Set Identification): the MAC location of access point

PWR: Signal level reported by the card.

Signals: Number of declarations bundles sent by the AP

#Data: Number of caught information parcels (if WEP, one of a kind IV check), including information show bundles.

#/s: Number of information parcels every second measure in the course of the most recent 10 seconds.

CH: Channel number (taken from reference point bundles).

MB: Maximum rate upheld by the AP. In the event that MB = 11, it's 802.11b, if MB = 22 it's 802.11b+ and higher rates are 802.11g.

ENC: Encryption calculation being used.

Figure: The figure recognized. TKIP is commonly utilized with WPA and CCMP is normally utilized with WPA2.

AUTH: The confirmation convention utilized.

ESSID: Shows the remote system name. The alleged "SSID", which can be void if SSID stowing away is enacted.

4. From the progression 3 above, we can discover access point with encryption calculation WPA2 and note the AP channel number. Presently we will see if target AP has WPS empowered or not.

wash - i wlan0 - c 8 - C - s

5 Steps Wifi Hacking - Cracking WPA2 Password

in the event that the WPS Locked status is No, then we prepared to break and move to step 5.

5. The last stride is splitting the WPA2 watchword utilizing reaver.

reaver - i <your_interface> - b <wi-fi casualty MAC address> –fail-wait=360

Since we as of now get the data from step 3 above, so my summon appear as though this:

reaver - i wlan0 - b E0:05:C5:5A:26:94 –fail-wait=360

5 Steps Wifi Hacking - Cracking WPA2 Password

it took around 5 hours to break 19 characters WPA2 secret word (vishnuvalentino.com) from my Kali virtualBox, yet it depend with our equipment and remote card.

Conclusions:

1. WPA and WPA2 security actualized without utilizing the Wi-Fi Protected Setup (WPS) highlight are unaffected by the security powerlessness.

2. To keep this assault, simply kill our WPS/QSS highlight on our entrance point. See picture underneath (I just have the Chinese rendition 😛 )

5 Steps Wifi Hacking - Cracking WPA2 Passwordutorial page