SlideShare a Scribd company logo
1 of 6
Download to read offline
Cracking WiFi Passwords Through CMD
CRACKING WIFI PASSWORDS THROUGH CMD
How to Hack WiFi Passwords Through CMD – Hello hackers this time we are going to tell
you how you can hack wifi passwords through CMD. It is a simple and easy tutorial.
According to Wikipedia :
Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security
protocols and security certification programs developed by the Wi-Fi Alliance to secure
wireless computer networks. The Alliance defined these in response to serious weaknesses
researchers had found in the previous system, WEP (Wired Equivalent Privacy)
A flaw in a feature added to Wi-Fi, called Wi-Fi Protected Setup (WPS), allows WPA and
WPA2 security to be bypassed and effectively broken in many situations. Many access point
they have a Wifi Protected Setup enabled by default (even after we hard reset the access point).
Requirements:
1. Wireless card (support promiscuous mode)
In this tutorial I use ALFA AWUS036H from Amazon.
2. Access point with WPA2 and WPS enables
5 STEPS WIFI HACKING – CRACKING WPA2 PASSWORD:
1. Open our terminal (CTRL+ALT+T) and type airmon-ng (view tips and tricks how to create
keyboard shortcut on kali linux)
this command will lists our wireless card that attached with our system.
2. The next step we need to stop our wireless monitor mode by running airmon-ng stop wlan0
3. Now we ready to capture the wireless traffic around us. By running airodump-ng wlan0 our
wireless interface will start capturing the data.
From the picture above, we can see many available access point with all the information. In the
green box is our victim access point which is my own access point
Information:
BSSID (Basic Service Set Identification): the MAC address of access point
PWR: Signal level reported by the card.
Beacons: Number of announcements packets sent by the AP
#Data: Number of captured data packets (if WEP, unique IV count), including data broadcast
packets.
#/s: Number of data packets per second measure over the last 10 seconds.
CH: Channel number (taken from beacon packets).
MB: Maximum speed supported by the AP. If MB = 11, it’s 802.11b, if MB = 22 it’s 802.11b+
and higher rates are 802.11g.
ENC: Encryption algorithm in use.
CIPHER: The cipher detected. TKIP is typically used with WPA and CCMP is typically used
with WPA2.
AUTH: The authentication protocol used.
ESSID: Shows the wireless network name. The so-called “SSID”, which can be empty if SSID
hiding is activated.
4. From the step 3 above, we can find access point with encryption algorithm WPA2 and note
the AP channel number. Now we will find out whether target AP has WPS enabled or not.
wash -i wlan0 -c 8 -C -s
if the WPS Locked status is No, then we ready to crack and move to step 5.
5. The last step is cracking the WPA2 password using reaver.
reaver -i <your_interface> -b <wi-fi victim MAC address> –fail-wait=360
Because we already get the information from step 3 above, so my command look like this:
reaver -i wlan0 -b E0:05:C5:5A:26:94 –fail-wait=360
it took about 5 hours to crack 19 characters WPA2 password (vishnuvalentino.com) from my
Kali virtualBox, but it depend with our hardware and wireless card.
Conclusions:
1. WPA and WPA2 security implemented without using the Wi-Fi Protected Setup (WPS)
feature are unaffected by the security vulnerability.
2. To prevent this attack, just turn off our WPS/QSS feature on our access point. See picture
below (I only have the Chinese version )
	
  

More Related Content

What's hot

Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)Mandeep Jadon
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hackingMihir Shah
 
Hack wifi password using kali linux
Hack wifi password using kali linuxHack wifi password using kali linux
Hack wifi password using kali linuxHelder Oliveira
 
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksChema Alonso
 
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
How Hack WiFi through Aircrack-ng in Kali Linux Cyber SecurityHow Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
How Hack WiFi through Aircrack-ng in Kali Linux Cyber SecurityAhmad Yar
 
Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkSecurityTube.Net
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Securityamiable_indian
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsAirTight Networks
 
Pentesting Wireless Networks and Wireless Network Security
Pentesting Wireless Networks and Wireless Network SecurityPentesting Wireless Networks and Wireless Network Security
Pentesting Wireless Networks and Wireless Network SecurityAyoma Wijethunga
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and ProtectionChandrak Trivedi
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level securityChetan Kumar S
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Fábio Afonso
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_kRama Krishna M
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connectionsguest85e156e
 

What's hot (20)

Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Hack wifi password using kali linux
Hack wifi password using kali linuxHack wifi password using kali linux
Hack wifi password using kali linux
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Aircrack
AircrackAircrack
Aircrack
 
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
 
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
How Hack WiFi through Aircrack-ng in Kali Linux Cyber SecurityHow Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
How Hack WiFi through Aircrack-ng in Kali Linux Cyber Security
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and Drink
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Pentesting Wireless Networks and Wireless Network Security
Pentesting Wireless Networks and Wireless Network SecurityPentesting Wireless Networks and Wireless Network Security
Pentesting Wireless Networks and Wireless Network Security
 
Wi-FI Hacking
Wi-FI Hacking Wi-FI Hacking
Wi-FI Hacking
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
 
Hack wireless internet connections or wifi
Hack wireless internet connections or wifiHack wireless internet connections or wifi
Hack wireless internet connections or wifi
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connections
 
Wpa3
Wpa3Wpa3
Wpa3
 

Viewers also liked

Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
Ahmad Siddiq Wi-Fi Ninjutsu ExploitationAhmad Siddiq Wi-Fi Ninjutsu Exploitation
Ahmad Siddiq Wi-Fi Ninjutsu Exploitationbarcamp.my
 
Exploiting WiFi Security
Exploiting WiFi Security Exploiting WiFi Security
Exploiting WiFi Security Hariraj Rathod
 
Tutorial de beni
Tutorial de beniTutorial de beni
Tutorial de benijoel2387
 
Linux/Unix Night - (PEN) Testing Toolkits (English)
Linux/Unix Night - (PEN) Testing Toolkits (English)Linux/Unix Night - (PEN) Testing Toolkits (English)
Linux/Unix Night - (PEN) Testing Toolkits (English)Jelmer de Reus
 
2015 Tales of the Cocktail on Tour - Mexico City Recap
2015 Tales of the Cocktail on Tour - Mexico City Recap2015 Tales of the Cocktail on Tour - Mexico City Recap
2015 Tales of the Cocktail on Tour - Mexico City RecapTales of the Cocktail
 
e-Learning Design: Assignment 2
e-Learning Design: Assignment 2e-Learning Design: Assignment 2
e-Learning Design: Assignment 210729503
 
Chemistry investigatory project class 12
Chemistry investigatory project class 12Chemistry investigatory project class 12
Chemistry investigatory project class 12gauravpar
 
Excell Center Horse Training
Excell Center Horse TrainingExcell Center Horse Training
Excell Center Horse Trainingaspiranet
 
Facebook for Your Restaurant
Facebook for Your RestaurantFacebook for Your Restaurant
Facebook for Your RestaurantAaron Allen
 

Viewers also liked (15)

Wi-fi Hacking
Wi-fi HackingWi-fi Hacking
Wi-fi Hacking
 
Aircrack ng
Aircrack ngAircrack ng
Aircrack ng
 
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
Ahmad Siddiq Wi-Fi Ninjutsu ExploitationAhmad Siddiq Wi-Fi Ninjutsu Exploitation
Ahmad Siddiq Wi-Fi Ninjutsu Exploitation
 
Exploiting WiFi Security
Exploiting WiFi Security Exploiting WiFi Security
Exploiting WiFi Security
 
Tutorial de beni
Tutorial de beniTutorial de beni
Tutorial de beni
 
Crackeando con aircrack
Crackeando con aircrackCrackeando con aircrack
Crackeando con aircrack
 
Como usar Aircrack
Como usar AircrackComo usar Aircrack
Como usar Aircrack
 
Wireless Cracking using Kali
Wireless Cracking using KaliWireless Cracking using Kali
Wireless Cracking using Kali
 
Linux/Unix Night - (PEN) Testing Toolkits (English)
Linux/Unix Night - (PEN) Testing Toolkits (English)Linux/Unix Night - (PEN) Testing Toolkits (English)
Linux/Unix Night - (PEN) Testing Toolkits (English)
 
2015 Tales of the Cocktail on Tour - Mexico City Recap
2015 Tales of the Cocktail on Tour - Mexico City Recap2015 Tales of the Cocktail on Tour - Mexico City Recap
2015 Tales of the Cocktail on Tour - Mexico City Recap
 
e-Learning Design: Assignment 2
e-Learning Design: Assignment 2e-Learning Design: Assignment 2
e-Learning Design: Assignment 2
 
Cocktail Recipe: Orange Dreamsicle
Cocktail Recipe: Orange DreamsicleCocktail Recipe: Orange Dreamsicle
Cocktail Recipe: Orange Dreamsicle
 
Chemistry investigatory project class 12
Chemistry investigatory project class 12Chemistry investigatory project class 12
Chemistry investigatory project class 12
 
Excell Center Horse Training
Excell Center Horse TrainingExcell Center Horse Training
Excell Center Horse Training
 
Facebook for Your Restaurant
Facebook for Your RestaurantFacebook for Your Restaurant
Facebook for Your Restaurant
 

Similar to A tutorial showing you how to crack wifi passwords using kali linux!

Cracking WEP Secured Wireless Networks
Cracking WEP Secured Wireless NetworksCracking WEP Secured Wireless Networks
Cracking WEP Secured Wireless NetworksHammam Samara
 
Dos on 802.11 and other security issues ( Case Study )
Dos on 802.11 and other security issues ( Case Study ) Dos on 802.11 and other security issues ( Case Study )
Dos on 802.11 and other security issues ( Case Study ) Shrobon Biswas
 
Hacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh JadonHacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh JadonOWASP Delhi
 
cracking WPA/WPA2 encrypted Wi-fi network using backtrack
cracking WPA/WPA2 encrypted Wi-fi network using backtrackcracking WPA/WPA2 encrypted Wi-fi network using backtrack
cracking WPA/WPA2 encrypted Wi-fi network using backtrackBidhan Ghimire
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminarNilesh Sapariya
 
4 wifi security
4 wifi security4 wifi security
4 wifi securityal-sari7
 
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN ImplementationAuditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN ImplementationCARMEN ALCIVAR
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11bguestd7b627
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSreekanth GS
 
Wireless penetration testing
Wireless penetration testingWireless penetration testing
Wireless penetration testingKamlesh Dhanwani
 
Wireless network security
Wireless network securityWireless network security
Wireless network securityVishal Agarwal
 
Wireless Pentesting: It's more than cracking WEP
Wireless Pentesting: It's  more than cracking WEPWireless Pentesting: It's  more than cracking WEP
Wireless Pentesting: It's more than cracking WEPJoe McCray
 
How to Hack WiFi on Windows
How to Hack WiFi  on Windows How to Hack WiFi  on Windows
How to Hack WiFi on Windows Vrushank Narola
 

Similar to A tutorial showing you how to crack wifi passwords using kali linux! (20)

Cracking WEP Secured Wireless Networks
Cracking WEP Secured Wireless NetworksCracking WEP Secured Wireless Networks
Cracking WEP Secured Wireless Networks
 
Dos on 802.11 and other security issues ( Case Study )
Dos on 802.11 and other security issues ( Case Study ) Dos on 802.11 and other security issues ( Case Study )
Dos on 802.11 and other security issues ( Case Study )
 
Hacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh JadonHacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh Jadon
 
cracking WPA/WPA2 encrypted Wi-fi network using backtrack
cracking WPA/WPA2 encrypted Wi-fi network using backtrackcracking WPA/WPA2 encrypted Wi-fi network using backtrack
cracking WPA/WPA2 encrypted Wi-fi network using backtrack
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Wi fi hacking
Wi fi hackingWi fi hacking
Wi fi hacking
 
Wi-Foo Ninjitsu Exploitation
Wi-Foo Ninjitsu ExploitationWi-Foo Ninjitsu Exploitation
Wi-Foo Ninjitsu Exploitation
 
Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
 
4 wifi security
4 wifi security4 wifi security
4 wifi security
 
Wifi cracking
Wifi crackingWifi cracking
Wifi cracking
 
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN ImplementationAuditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
Wireless penetration testing
Wireless penetration testingWireless penetration testing
Wireless penetration testing
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Wireless Pentesting: It's more than cracking WEP
Wireless Pentesting: It's  more than cracking WEPWireless Pentesting: It's  more than cracking WEP
Wireless Pentesting: It's more than cracking WEP
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Wireless lan security(10.8)
Wireless lan security(10.8)Wireless lan security(10.8)
Wireless lan security(10.8)
 
How to Hack WiFi on Windows
How to Hack WiFi  on Windows How to Hack WiFi  on Windows
How to Hack WiFi on Windows
 
Backtrack Manual Part10
Backtrack Manual Part10Backtrack Manual Part10
Backtrack Manual Part10
 

More from edwardo

Diplomado en Estrategias de Innovación (Promoción) (Marketing)
Diplomado en Estrategias de Innovación� (Promoción) (Marketing)Diplomado en Estrategias de Innovación� (Promoción) (Marketing)
Diplomado en Estrategias de Innovación (Promoción) (Marketing)edwardo
 
Machine design january 2015
Machine design   january 2015Machine design   january 2015
Machine design january 2015edwardo
 
Introducción al Marketing
 Introducción al Marketing  Introducción al Marketing
Introducción al Marketing edwardo
 
Competencias Ejecutivas
Competencias  Ejecutivas Competencias  Ejecutivas
Competencias Ejecutivas edwardo
 
Las 4 ps del marketing (ejemplo)
Las 4 ps del marketing (ejemplo)Las 4 ps del marketing (ejemplo)
Las 4 ps del marketing (ejemplo)edwardo
 
Las 7 mejores herramientas gratuitas para buscar keywords
Las 7 mejores herramientas gratuitas para buscar keywordsLas 7 mejores herramientas gratuitas para buscar keywords
Las 7 mejores herramientas gratuitas para buscar keywordsedwardo
 
Ian Kershaw, "Hitler 1936-1945: Nemesis
Ian Kershaw, "Hitler 1936-1945: NemesisIan Kershaw, "Hitler 1936-1945: Nemesis
Ian Kershaw, "Hitler 1936-1945: Nemesisedwardo
 
Interés por el comportamiento del consumidor
Interés por el comportamiento del consumidorInterés por el comportamiento del consumidor
Interés por el comportamiento del consumidoredwardo
 
Seguridad en dispositivos móviles 2014
Seguridad en dispositivos móviles 2014Seguridad en dispositivos móviles 2014
Seguridad en dispositivos móviles 2014edwardo
 
INTERNET MONITOR 2013: Reflections on the Digital World
INTERNET MONITOR 2013: Reflections on the Digital WorldINTERNET MONITOR 2013: Reflections on the Digital World
INTERNET MONITOR 2013: Reflections on the Digital Worldedwardo
 
Analizar una presentacion
Analizar una presentacionAnalizar una presentacion
Analizar una presentacionedwardo
 
El ordenador y la producción básica de documentos
El ordenador y la producción básica de documentosEl ordenador y la producción básica de documentos
El ordenador y la producción básica de documentosedwardo
 
DICCIONARIO DE MARKETING
DICCIONARIO DE MARKETINGDICCIONARIO DE MARKETING
DICCIONARIO DE MARKETINGedwardo
 
Ideas de marketing 2011 recopilación de post de marketing
Ideas de marketing 2011 recopilación de post de marketingIdeas de marketing 2011 recopilación de post de marketing
Ideas de marketing 2011 recopilación de post de marketingedwardo
 
10 trucos para acelerar windows 8 lo máximo posible
10 trucos para acelerar windows 8 lo máximo posible10 trucos para acelerar windows 8 lo máximo posible
10 trucos para acelerar windows 8 lo máximo posibleedwardo
 
Publicidad 2.0 Lo que deberían saber quienes trabajan enpublicidad, marketing...
Publicidad 2.0 Lo que deberían saber quienes trabajan enpublicidad, marketing...Publicidad 2.0 Lo que deberían saber quienes trabajan enpublicidad, marketing...
Publicidad 2.0 Lo que deberían saber quienes trabajan enpublicidad, marketing...edwardo
 
25 retro social icons badge label pack
25 retro social icons badge label pack25 retro social icons badge label pack
25 retro social icons badge label packedwardo
 
infografía del primer estudio de usos y hábitos de dispositivos móviles en mé...
infografía del primer estudio de usos y hábitos de dispositivos móviles en mé...infografía del primer estudio de usos y hábitos de dispositivos móviles en mé...
infografía del primer estudio de usos y hábitos de dispositivos móviles en mé...edwardo
 
Cómo aprovechar el poder de los social
Cómo aprovechar el poder de los socialCómo aprovechar el poder de los social
Cómo aprovechar el poder de los socialedwardo
 
3ª GENERACIÓN DE SOCIAL MEDIA El fin del experimento, el inicio de la rentabi...
3ª GENERACIÓN DE SOCIAL MEDIA El fin del experimento, el inicio de la rentabi...3ª GENERACIÓN DE SOCIAL MEDIA El fin del experimento, el inicio de la rentabi...
3ª GENERACIÓN DE SOCIAL MEDIA El fin del experimento, el inicio de la rentabi...edwardo
 

More from edwardo (20)

Diplomado en Estrategias de Innovación (Promoción) (Marketing)
Diplomado en Estrategias de Innovación� (Promoción) (Marketing)Diplomado en Estrategias de Innovación� (Promoción) (Marketing)
Diplomado en Estrategias de Innovación (Promoción) (Marketing)
 
Machine design january 2015
Machine design   january 2015Machine design   january 2015
Machine design january 2015
 
Introducción al Marketing
 Introducción al Marketing  Introducción al Marketing
Introducción al Marketing
 
Competencias Ejecutivas
Competencias  Ejecutivas Competencias  Ejecutivas
Competencias Ejecutivas
 
Las 4 ps del marketing (ejemplo)
Las 4 ps del marketing (ejemplo)Las 4 ps del marketing (ejemplo)
Las 4 ps del marketing (ejemplo)
 
Las 7 mejores herramientas gratuitas para buscar keywords
Las 7 mejores herramientas gratuitas para buscar keywordsLas 7 mejores herramientas gratuitas para buscar keywords
Las 7 mejores herramientas gratuitas para buscar keywords
 
Ian Kershaw, "Hitler 1936-1945: Nemesis
Ian Kershaw, "Hitler 1936-1945: NemesisIan Kershaw, "Hitler 1936-1945: Nemesis
Ian Kershaw, "Hitler 1936-1945: Nemesis
 
Interés por el comportamiento del consumidor
Interés por el comportamiento del consumidorInterés por el comportamiento del consumidor
Interés por el comportamiento del consumidor
 
Seguridad en dispositivos móviles 2014
Seguridad en dispositivos móviles 2014Seguridad en dispositivos móviles 2014
Seguridad en dispositivos móviles 2014
 
INTERNET MONITOR 2013: Reflections on the Digital World
INTERNET MONITOR 2013: Reflections on the Digital WorldINTERNET MONITOR 2013: Reflections on the Digital World
INTERNET MONITOR 2013: Reflections on the Digital World
 
Analizar una presentacion
Analizar una presentacionAnalizar una presentacion
Analizar una presentacion
 
El ordenador y la producción básica de documentos
El ordenador y la producción básica de documentosEl ordenador y la producción básica de documentos
El ordenador y la producción básica de documentos
 
DICCIONARIO DE MARKETING
DICCIONARIO DE MARKETINGDICCIONARIO DE MARKETING
DICCIONARIO DE MARKETING
 
Ideas de marketing 2011 recopilación de post de marketing
Ideas de marketing 2011 recopilación de post de marketingIdeas de marketing 2011 recopilación de post de marketing
Ideas de marketing 2011 recopilación de post de marketing
 
10 trucos para acelerar windows 8 lo máximo posible
10 trucos para acelerar windows 8 lo máximo posible10 trucos para acelerar windows 8 lo máximo posible
10 trucos para acelerar windows 8 lo máximo posible
 
Publicidad 2.0 Lo que deberían saber quienes trabajan enpublicidad, marketing...
Publicidad 2.0 Lo que deberían saber quienes trabajan enpublicidad, marketing...Publicidad 2.0 Lo que deberían saber quienes trabajan enpublicidad, marketing...
Publicidad 2.0 Lo que deberían saber quienes trabajan enpublicidad, marketing...
 
25 retro social icons badge label pack
25 retro social icons badge label pack25 retro social icons badge label pack
25 retro social icons badge label pack
 
infografía del primer estudio de usos y hábitos de dispositivos móviles en mé...
infografía del primer estudio de usos y hábitos de dispositivos móviles en mé...infografía del primer estudio de usos y hábitos de dispositivos móviles en mé...
infografía del primer estudio de usos y hábitos de dispositivos móviles en mé...
 
Cómo aprovechar el poder de los social
Cómo aprovechar el poder de los socialCómo aprovechar el poder de los social
Cómo aprovechar el poder de los social
 
3ª GENERACIÓN DE SOCIAL MEDIA El fin del experimento, el inicio de la rentabi...
3ª GENERACIÓN DE SOCIAL MEDIA El fin del experimento, el inicio de la rentabi...3ª GENERACIÓN DE SOCIAL MEDIA El fin del experimento, el inicio de la rentabi...
3ª GENERACIÓN DE SOCIAL MEDIA El fin del experimento, el inicio de la rentabi...
 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Recently uploaded (20)

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 

A tutorial showing you how to crack wifi passwords using kali linux!

  • 1. Cracking WiFi Passwords Through CMD CRACKING WIFI PASSWORDS THROUGH CMD How to Hack WiFi Passwords Through CMD – Hello hackers this time we are going to tell you how you can hack wifi passwords through CMD. It is a simple and easy tutorial. According to Wikipedia : Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, WEP (Wired Equivalent Privacy) A flaw in a feature added to Wi-Fi, called Wi-Fi Protected Setup (WPS), allows WPA and WPA2 security to be bypassed and effectively broken in many situations. Many access point they have a Wifi Protected Setup enabled by default (even after we hard reset the access point). Requirements: 1. Wireless card (support promiscuous mode) In this tutorial I use ALFA AWUS036H from Amazon.
  • 2. 2. Access point with WPA2 and WPS enables 5 STEPS WIFI HACKING – CRACKING WPA2 PASSWORD: 1. Open our terminal (CTRL+ALT+T) and type airmon-ng (view tips and tricks how to create keyboard shortcut on kali linux)
  • 3. this command will lists our wireless card that attached with our system. 2. The next step we need to stop our wireless monitor mode by running airmon-ng stop wlan0 3. Now we ready to capture the wireless traffic around us. By running airodump-ng wlan0 our wireless interface will start capturing the data.
  • 4. From the picture above, we can see many available access point with all the information. In the green box is our victim access point which is my own access point Information: BSSID (Basic Service Set Identification): the MAC address of access point PWR: Signal level reported by the card. Beacons: Number of announcements packets sent by the AP #Data: Number of captured data packets (if WEP, unique IV count), including data broadcast packets. #/s: Number of data packets per second measure over the last 10 seconds. CH: Channel number (taken from beacon packets). MB: Maximum speed supported by the AP. If MB = 11, it’s 802.11b, if MB = 22 it’s 802.11b+ and higher rates are 802.11g. ENC: Encryption algorithm in use. CIPHER: The cipher detected. TKIP is typically used with WPA and CCMP is typically used with WPA2. AUTH: The authentication protocol used. ESSID: Shows the wireless network name. The so-called “SSID”, which can be empty if SSID hiding is activated.
  • 5. 4. From the step 3 above, we can find access point with encryption algorithm WPA2 and note the AP channel number. Now we will find out whether target AP has WPS enabled or not. wash -i wlan0 -c 8 -C -s if the WPS Locked status is No, then we ready to crack and move to step 5. 5. The last step is cracking the WPA2 password using reaver. reaver -i <your_interface> -b <wi-fi victim MAC address> –fail-wait=360 Because we already get the information from step 3 above, so my command look like this: reaver -i wlan0 -b E0:05:C5:5A:26:94 –fail-wait=360
  • 6. it took about 5 hours to crack 19 characters WPA2 password (vishnuvalentino.com) from my Kali virtualBox, but it depend with our hardware and wireless card. Conclusions: 1. WPA and WPA2 security implemented without using the Wi-Fi Protected Setup (WPS) feature are unaffected by the security vulnerability. 2. To prevent this attack, just turn off our WPS/QSS feature on our access point. See picture below (I only have the Chinese version )