Wifi hacking – WPA/WPA2 WiFi password hacking using aircrak-ng (ubuntu)

Wifi hacking – WPA/WPA2 WiFi password hacking using aircrak-ng (ubuntu)

Video is ready, Click Here to View ×


WAP2 -PSK (Wi-Fi Protected Access II with a pre-shared key for wireless security) is a replacement of WEP. It uses a stronger encryption algorithm, AES, which is very difficult to crack but not impossible.The weakness in the WPA2-PSK system is that the encrypted password is shared in what is known as the 4-way handshake. When a client authenticates to the access point (AP), the client and the AP go through a 4-step process to authenticate the user to the AP. If we can grab the password at…

admin

23 Comments

Sir I have a doubt .I am studying in university.Iam using ubuntu operating system.Iam using in university lan network .The connection will come only Mozilla Firefox.how can I get network to terminal and whole device in system.we using through proxy.they provided a username and password.please help me.

As someone has mentioned before when I put in "airodump-ng mon0" I get an error message. As you can see below in the step before there are no interfaces. Could someone suggest what I should. Any help would be greatly appreciated.
lg@lg:~$ sudo -s
[sudo] password for lg:

root@lg:~# ifconfig
enp0s3 Link encap:Ethernet HWaddr 08:00:27:7e:44:3b
inet addr:10.0.2.15 Bcast:10.0.2.255 Mask:255.255.255.0
inet6 addr: fe80::3a96:4e79:bbf5:b54/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:23 errors:0 dropped:0 overruns:0 frame:0
TX packets:170 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:3624 (3.6 KB) TX bytes:20325 (20.3 KB)

lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:65536 Metric:1
RX packets:269 errors:0 dropped:0 overruns:0 frame:0
TX packets:269 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:20044 (20.0 KB) TX bytes:20044 (20.0 KB)

root@lg:~# airmon-ng start enp0s3

Found 4 processes that could cause trouble.
If airodump-ng, aireplay-ng or airtun-ng stops working after
a short period of time, you may want to kill (some of) them!

PID Name
740 NetworkManager
2158 dhclient
2230 avahi-daemon
2231 avahi-daemon

Interface Chipset Driver

root@lg:~# airodump-ng mon0
nl80211 not found.
Interface mon0:
ioctl(SIOCGIFINDEX) failed: No such device

I don't understand why tutorials like this simply do not SPEAK and always typing out having us to read everything. Can you just voice change your voice and actually talk? Also what key did you press around 2:23? You magically hit a button leaving some of us in blank stare/missing a complete step.

what if there is no handshake and the we typed sudo aireplay-ng –deauth <number of the packets > -a <target> <interface name> and he got:

Waiting for beacon frame (BSSID: xx:xx:xx:xx:xx:xx) on channel 4
00:04:42 mon0 is on channel 4, but the AP uses channel 1

Let's be honest, the chance of finding a Wifi password using this method are very tiny if the network owner didn't change the passphrase for something common/usual.

Leave a Reply

Your email address will not be published. Required fields are marked *