{"id":13327,"date":"2017-05-17T09:46:59","date_gmt":"2017-05-17T04:16:59","guid":{"rendered":"https:\/\/www.wikitechy.com\/technology\/?p=13327"},"modified":"2017-05-17T09:46:59","modified_gmt":"2017-05-17T04:16:59","slug":"5-steps-best-wifi-hacking-tricks-cracking-wpa2-password","status":"publish","type":"post","link":"https:\/\/www.wikitechy.com\/technology\/5-steps-best-wifi-hacking-tricks-cracking-wpa2-password\/","title":{"rendered":"5 Steps Best Wifi Hacking Tricks \u2013 Cracking WPA2 Password"},"content":{"rendered":"<p>New Kali linux is on the way. Keep backtrack safe.\u00a0Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, WEP (Wired Equivalent Privacy).<\/p>\n[ad type=\u201dbanner\u201d]\n<h4 id=\"wifi-hacking-tricks-and-tips\"><span style=\"color: #993300;\"><strong>Wifi Hacking Tricks And Tips<\/strong><\/span><\/h4>\n<p><strong>Requirements:<\/strong><\/p>\n<ul>\n<li>Wireless card (support promiscuous mode)<\/li>\n<li>Access point with WPA2 and WPS enables<\/li>\n<li>Kali Linux<\/li>\n<\/ul>\n<h4 id=\"steps-to-crack-wpa-2-wifi-password\"><span style=\"color: #ff6600;\"><strong>Steps To Crack WPA 2 Wifi Password<\/strong><\/span><\/h4>\n<ol>\n<li>Open our terminal (CTRL+ALT+T) and type airmon-ngthis command will lists our wireless card that attached with our system.<\/li>\n<li>The next step we need to stop our wireless monitor mode by running airmon-ng stop wlan0<\/li>\n<li>Now we ready to capture the wireless traffic around us. By running airodump-ng wlan0 our wireless interface will start capturing the data.<br \/>\n<strong>Information:<\/strong><br \/>\n<strong>BSSID (Basic Service Set Identification):<\/strong> the MAC address of access point<br \/>\n<strong>PWR:<\/strong> Signal level reported by the card.<br \/>\n<strong>Beacons:<\/strong> Number of announcements packets sent by the AP<br \/>\n<strong># Data:<\/strong> Number of captured data packets (if WEP, unique IV count), including data broadcast packets.<br \/>\n<strong>#\/s:<\/strong> Number of data packets per second measure over the last 10 seconds.<br \/>\n<strong>CH:<\/strong> Channel number (taken from beacon packets).<br \/>\n<strong>MB:<\/strong> Maximum speed supported by the AP. If MB = 11, it\u2019s 802.11b, if MB = 22 it\u2019s 802.11b+ and higher rates are 802.11g.<br \/>\n<strong>ENC:<\/strong> Encryption algorithm in use.<br \/>\n<strong>CIPHER:<\/strong> The cipher detected. TKIP is typically used with WPA and CCMP is typically used with WPA2.<br \/>\n<strong>AUTH:<\/strong> The authentication protocol used.<br \/>\n<strong>ESSID:<\/strong> Shows the wireless network name. The so-called \u201cSSID\u201d, which can be empty if SSID hiding is activated.<\/li>\n<\/ol>\n<ol start=\"4\">\n<li>From the step 3 above, we can find access point with encryption algorithm WPA2 and note the AP channel number. Now find out whether target AP has WPS enabled or not.\n<p style=\"text-align: center;\"><code>wash -i wlan0 -c 8 -C -s<\/code><\/p>\n<p>if the WPS Locked status is No, then we ready to crack and move to step<\/li>\n<li>The last step is cracking the WPA2 password using reaver.\n<p style=\"text-align: center;\"><code>reaver -i <your_interface> -b <wi-fi victim MAC address> \u2013fail-wait=360<\/code><\/p>\n<p>Because we already get the information from step 3 above, so my command look like this:<\/p>\n<p style=\"text-align: center;\"><code>reaver -i wlan0 -b E0:05:C5:5A:26:94 \u2013fail-wait=360<\/code><\/p>\n<p>it takes hours to crack 20 characters WPA2 password depend with our hardware and wireless card.<\/li>\n<\/ol>\n<h4 id=\"note-wireless-security-tips\"><span style=\"color: #99cc00;\"><strong>Note: Wireless Security Tips<\/strong><\/span><\/h4>\n<ol>\n<li>WPA and WPA2 security implemented without using the Wi-Fi Protected Setup (WPS) feature are unaffected by the security vulnerability.<\/li>\n<li>To prevent this attack, just turn off our WPS\/QSS feature on our access point.<\/li>\n<\/ol>\n[ad type=\u201dbanner\u201d]\n<p><strong>5 Steps Best Wifi Hacking Tricks \u2013 Cracking WPA2 Password \u2013\u00a0<\/strong>Easy way to hack the password of any wifi near you with simple steps given above.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>5 Steps Best Wifi Hacking Tricks &#8211; Hacking &#8211; Cracking WPA2 Password &#8211; Serious weaknesses researchers had found in the previous system, WEP.<\/p>\n","protected":false},"author":2,"featured_media":15475,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29859,7607,3092],"tags":[39982,39987,39986,39984,39985,39983,39989,28915,39993,39997,39990,39988,39995,39992,34278,39996,28206,28221,39991,39994],"class_list":["post-13327","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacking","category-networking","category-security","tag-5-steps-best-wifi-hacking-tricks-cracking-wpa2-password","tag-crack-wifi-wpa2","tag-hack-pass-wifi-wpa2","tag-hack-wifi-wpa2","tag-hack-wifi-wpa2-android","tag-hack-wpa2-wifi","tag-how-to-crack-wpa2-wifi-password","tag-how-to-hack-wifi-with-kali-linux-step-by-step","tag-how-to-hack-wpa-wifi-on-android","tag-how-to-hack-wpa-wifi-password-in-android","tag-how-to-hack-wpa2-wifi","tag-how-to-hack-wpa2-wifi-password","tag-how-to-hack-wpa2-wifi-password-in-windows-7","tag-how-to-hack-wpa2-wifi-password-using-cmd","tag-how-to-hack-wpa2-wifi-password-with-android","tag-steps-to-hack-wifi-password-on-android","tag-wifi-hacking-tricks","tag-wifi-password-hacking-tricks","tag-wifi-tricks","tag-wpa-wpa2-psk-password-hack-android"],"_links":{"self":[{"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/posts\/13327","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/comments?post=13327"}],"version-history":[{"count":0,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/posts\/13327\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/media\/15475"}],"wp:attachment":[{"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/media?parent=13327"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/categories?post=13327"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/tags?post=13327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}