0% found this document useful (0 votes)
12 views5 pages

Day 31 Wifi Hacking

The document outlines various WiFi encryption protocols, detailing their security levels and vulnerabilities, from the outdated WEP to the more secure WPA3. It also describes methods for WiFi hacking, including network sniffing and deauthentication attacks, using tools like Aircrack-ng and Airodump-ng. The document serves as a guide for ethical hacking practices related to WiFi technologies.

Uploaded by

techbrohi828
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views5 pages

Day 31 Wifi Hacking

The document outlines various WiFi encryption protocols, detailing their security levels and vulnerabilities, from the outdated WEP to the more secure WPA3. It also describes methods for WiFi hacking, including network sniffing and deauthentication attacks, using tools like Aircrack-ng and Airodump-ng. The document serves as a guide for ethical hacking practices related to WiFi technologies.

Uploaded by

techbrohi828
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

wifi hacking

06 May 2024 21:29

DAY 31 OF 75 DAYS
ETHICAL HACKING
COURSE
WiFi Technologies:
WiFi is a type of wireless networking technology that uses radio waves to connect devices to the internet or communicate witheach other.

WiFi Types for Hacking Purposes:


1.
2. WEP (Wired Equivalent Privacy): An outdated encryption protocol that's easily crackable.
3. WPA (Wi-Fi Protected Access): A more secure encryption protocol that's still vulnerable to cracking with the right tools.
4. WPA2 (Wi-Fi Protected Access 2): A widely used encryption protocol that's considered secure, but still vulnerable to hacking with advanced tools.
5. WPA3 (Wi-Fi Protected Access 3): The latest encryption protocol, designed to provide improved security and better protection against hacking.

WEP (Wired Equivalent Privacy)


• Introduced in 1999
• Uses a 40-bit or 104-bit encryption key
• Uses RC4 algorithm for encryption
• Easily crackable using tools like Aircrack-ng
• Weaknesses:
• Uses a static key, making it vulnerable to dictionary attacks
• Uses a weak encryption algorithm (RC4)
• Can be cracked in a matter of minutes using specialized tools

WPA (Wi-Fi Protected Access)


• Introduced in 2003
• Uses a 128-bit encryption key
• Uses TKIP (Temporal Key Integrity Protocol) for encryption
• More secure than WEP, but still vulnerable to hacking

• Weaknesses:
• Uses a static key, making it vulnerable to dictionary attacks
• TKIP is vulnerable to attacks like WPA-PSK (Pre-Shared Key) attacks
• Can be cracked using tools like Aircrack-ng

WPA2 (Wi-Fi Protected Access 2)


• Introduced in 2004
• Uses a 128-bit or 152-bit encryption key
• Uses AES (Advanced Encryption Standard) for encryption
• Considered secure, but still vulnerable to hacking

• Weaknesses:
• Uses a static key, making it vulnerable to dictionary attacks
• AES is vulnerable to attacks like BEAST (Browser Exploit Against SSL/TLS)
• Can be cracked using tools like Aircrack-ng and other advanced hacking tools

WPA3 (Wi-Fi Protected Access 3)


• Introduced in 2018
• Uses a 192-bit or 256-bit encryption key
• Uses AES-256 for encryption
• Designed to provide improved security and better protection against hacking
• Features:
• Improved encryption with AES-256
• Enhanced password protection with Simultaneous Authentication of Equals (SAE)
• Improved protection against brute-force attacks
• Better protection against offline password guessing attacks
• Improved support for IoT devices

In summary, WEP is the weakest and most easily crackable, while WPA3 is the strongest and most secure. WPA and WPA2 are considered mid-range in terms of security, but
still vulnerable to hacking. When it comes to hacking, WPA3 is the most challenging to crack, but not impossible.

There are mainly three sections under it


1. Means attacks before connections

wifi hacking Page 1


There are mainly three sections under it
1. Means attacks before connections
2. Connect to the network
3. Attacks after connecting to the networks

• Lets talk about monitor and managed mode


• Managed mode is what we generally use in daily life means we connect to networks and try to find some info etc
• And in monitor mode we cant connect to network , in this mode we try to snif network without knowing there password
• Means before the cracking the pass words we use monitor mode for sniffing and finding the data and then after we use managedmode got it how to turn on off>

• two methods manual and automatic

• Lets see manual first
• $ ifconfig wlan0 down
• $ iwconfig wlan0 mode monitor
• $ ifconfig wlan0 up

• same command turning into managed mode
And lets talk about my fav auto way

• run command
• $ airmon-ng start wlan0
• Some times it start working so have to check
• $ ifconfig ( if will be working then you can see wlan0mon instead of wlan0)
• For confirmation you can run
• $ iwconfig wlan0mon
• Ok
• And it this not works then
• $ airmon-ng check kill
• $airmon-ng start wlan0

Gathering information from Networks

➢ Network-Sniffing_____

➢ First we will start getting some information from the network with the help of monitor mode ok
➢ Lets get into monitor mode
➢ $ airmon-ng start wlan0
➢ Then I will run command to see how many networks is up around me and I will collect information

➢ As you can see my around is iphone hotspot or router so I will collect some info
➢ BSSID > this is mac address of router or hotspot
➢ PWR > this indicates the distance of router from us means if the number is bigger the router is near to us ook
➢ Beaconse > data packets
➢ Ch > means channel means on which channel we are connected with the router ok we can change the channel number to for betterinternet speed
➢ And then
➢ ENC > stands for security type ( encryption)
➢ ESSID > stands for router name

Airodump specific target___

wifi hacking Page 2


➢ This means in this section we will focusing on specific target ok se let me expalin the commands better with screenshots ok

➢ c add
➢ As you can see the commands and result by yourself you can write oStations means the device connected with router and there maut like this
➢ Writing file is not neccesary but if we write we can analyis in wireshark in detailed ok
➢ Or if we want to find out any file with name in linux then we can run coomad
➢ $ ls <file name>*
➢ $ ls test*

➢ We can analyis it it wireshark deeply see

➢ Deauthentication attack___

➢ Lets understand this


➢ In this attack we will use airplay-ng tool ok
➢ Means we can disconnect the device we want to disconnect from the network by just sending deauth pakcets ok

wifi hacking Page 3


➢ Means we can disconnect the device we want to disconnect from the network by just sending deauth pakcets ok
➢ Lets see

➢ Here a means the source mac add means the router mac add
➢ And c means the victims means destination mac add ok
➢ And we can send either 1000 deauth pakcets etc and 100 etc
➢ And if we got any error then we can clsoe all stuff and
➢ Will all things that is nessecery for monitor mode
➢ $ airmon-ng check killThen we will select specific target and then
➢ $ airodump-ng --channel <name> --bssid <mac addr of router> wlan0
➢ Then we will select which one we want to disconnect and the I will open new window and then run command
➢ In this case we will be using aireplay-ng
➢ So
➢ $ aireplay-ng --deauth <choose yours I will prefer 1000> -a <router mac add> -c < victim mac addr> wlan0
➢ And you are done

wifi hacking Page 4


wifi hacking Page 5

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy