Hello Students🙂 How Are You? Welcome Again To My Website🙂 I, Wajahat Ali Khan Have Brought A Article For You In Which We Will See How You Can Hack A Wi-Fi. I Have Brough This Video On Wireless Hacking Where We Will See The Hacking Of Wpa, Wps And Wpa 2. We Will See How To Perform Hacking Of All Kinds Of Wireless Devices. We Will See Wi-Fi Jamming. And We Will Also See How To Do Sniffing In Wi-Fi. It Means That We Will See How To Capture Data Without Connecting To Any Network So, Let'S Start Our Video. We Will Turn On Our Kali Machine. And Here, We Will Use Wi-Fi Stick. We Will Use Wi-Fi Stick. And With This Small Wi-Fi Stick, We Will Perform Wi-Fi Hacking. We Will Gather A Lot Of Information. We Will Not Just Do Normal Password Cracking. We Will Do A Lot More Than That.
Let'S Start By Opening Our Terminal First. By Opening The Terminal, We Have To Give Root Permissions. After That, Please Understand Carefully What We Have To Do. We Saw In Theory Sessions How Does A Wi-Fi Work. Our Broadband Allots Ip To Us. It Will Send "Who Is" Request. If We Get Connected To It By Pressing "Submit" Button After Entering Id And Password, A Handshake File Is Generated. So, We Have To Capture The Traffic And Handshake File. How Can We Capture That? We Can Capture That Only When Our Wi-Fi Stick Or Our Wi-Fi Device Is In Monitor Mode So That It Can Monitor And Analyze The Data That Is Transferred Around. So, We Can Capture That Data And Passwords File And Then We Can Either Crack It Or Read It. For Staring That, Our First Work Is To Take The Wi-Fi Stick In Monitor Mode. Hence, I Have Used External Wi-Fi Stick That Supports Monitor Mode. For That, You Have To Write Ifconfig And Once Test The Name Of Your Wi-Fi. As Of Now, There Are 2 Wi-Fi Sticks Here. First One Is The One That Is In-Built In My Laptop I.E. Wlan0. And The Second One Is The One That I Have Just Plugged In That Has The Name Wlan1.
So, We Have To Convert The Wi-Fi Stick Of Wlan1. So, First Let Us Write Iwconfig Which Will Show Us Wireless Devices. And Here, It Is Showing Us Wlan0 And Wlan1. If You Note It Here, Wlan0 Is Connected To Wscube Tech Which Has Its Mode As "Managed". And Wlan1 Is Not Connected To Anything Which Also Has Its Mode As Managed. We Have To Change The Mode Of Wlan1 As "Monitor". We Have To Convert Its Mode From "Managed" To "Monitor". So, Let'S Start It. When We Change Any Settings Or Configuration Of Any Device Then We Stop That Device First. We Don'T Do Any Changes In Running Process Otherwise It Can Corrupt Some Files. So, We Will Write "Ifconfig Wlan1 Down" Which Will Stop Our Device Wlan1 For Some Time So That We Can Do Some Changes In It.
Now We Will Write Here: Iwconfig Wlan1 Mode Monitor. We Had To Change Its Mode From "Manage" To "Monitor". Then If We Press "Enter". Now, Its Mode Is Changed And Now, We Have To Again Turn On This Wi-Fi Stick. So, Instead Of "Down", We Will Write "Up" Here". So, Instead Of "Down", We Will Write "Up" Here". And After Writing "Up" We Will Hit "Enter". So, Now Our Wlan1 Is Turned On. Now, I Will Turn On The Hotspot Of Any Of My Device So That It Should Be Shown Here. So, I Have Turned On The Hotspot And Let'S Check Whether The Mode Of Device Is Changed Or Not. We Will Write Ifconfig And Hit Enter Button. We Can See That The Mode Of Wlan1 Is Shown As "Monitor".
Like The Monitor Of Our Class Watches Everything, We Have Become The Monitor Now And We Can Capture Or Read The Wireless Communication That Is Happening In Our Lan. Now, We Will Write Here: "Airodump-Ng Wlan1" Where Wlan1 Is Our Interface Name. As Soon As We Hit "Enter" Now, We Can See All The Wi-Fi Networks Around Us. So, Some Networks Are Shown Here. Now, We Have To Select A Target. The Information That Is Shown Here Is: Bssid Which Means Mac Address. So, All The Values That We Are Seeing In Bssid, They All Are Mac Addresses. After That, Its Power Is Shown From Which We Come To Know How Far Or Near It Is. Then, It Will Show Us The Data That Is Being Transmitted.
If The Data Is Fluctuating More Then It Means That It Is An Active Hotspot, Users Are Connected To It And Internet Is Working. Then, It Is Also Showing The Channel On Which It'S Running. It Is Also An Important Information For Us Because We Have To Capture Them On These Channels Only. It Is Similar Like The Port On Which It Is Running. After That, It Is Showing The Mbs That Are Being Transferred. All Are Having The Encryption Technique As Wpa 2. And All These Are Logged In This. What Do We Need To Do Now? Now, We Have To Capture Their File And We Have To Know More About Them Like Which Users Are Connected To Them And What Types Of Work They Are Doing. So, Let'S See That. Students, We Have Got All The Wi-Fi Networks Around Us. Now, We Will Select A Network And Start Its Scanning. We Will Stop This Here With Ctrl + C. Since We Have Got The Mac Addresses, Bssid, Essid And Channel Numbers Of All Systems, First Of All, We Will Select This Mac Address On Which We Have To Attack. We Will Copy It By The Command Ctrl + Shift + C. Then, We Will Write The Command: "Airodump-Ng -- Bssid" And Then We Have To Paste The Bssid Here. Here, We Will Paste The Bssid That We Had Copied Which Is The Mac Address Of The Victim Machine I.E. Of The Wi-Fi That We Have To Hack Or Crack The Password Of.
So, We Have Entered The Mac Address Of That. Then We Will Write "--Ch" And Write Its Channel No. Here. You Can See That The Channel No. Of The Blessed_boy Is 6. So, We Will Write "6" Here. And Then, We Will Create A File Here In Which All The Data Will Be Captured. It Means That We Are Capturing The Data That Is Being Transmitted By The People That Are Connected To The Mac Address Or The Network On Channel 6. We Are Going To Capture All This Data Without Connecting To That Wi-Fi. For That, We Will Store All This Data In A File. So, We Will Keep The Name Of That File As "Hacked". Then We Write "Wlan1" Which Is The Name Of Our Interface Through We Are Doing Entire Scanning. We Will Write That Name As Wlan1. After Writing This, We Have To Just Hit "Enter". Here, We Have To Use The Package Airodump-Ng. We Have Given This A Mac Address Through Bssid Which You Can See Here That Bssid Was The Mac Address. We Specified The Channel And After That We Gave The File Name As "Hacked" To Capture The Information In Wlan1. Then, We Will Hit "Enter".
Now, We Have Started Monitoring Blessed_boy. We Can See How Many People Are Getting Connected To It And The Data That Is Being Transmitted. We Won'T Be Able To See The Data Here. But The Data That Is Being Transmitted Will Be Stored. As Of Now, We Can See That A User Is Connected Here. You Can See Here. This Is Our Mac Address And This Is The Mac Address Of The Victim Or The Hotspot And Someone Is Connected To It. A User Is Added Here Which Means That A User Is Connected To This Hotspot. So, For Connecting, It Might Have Sent A Handshake File To This. As Soon As The User Pressed Submit By Entering The Password, A Handshake File Might Have Been Sent To Our Hotspot. Now, We Have To Disconnect This User So That It Can Send Handshake File For Connecting Again. Though It Doesn'T Send Manually But System Sends It Automatically While Connecting Every Time So That It Shouldn'T Get Connected If Password Is Changed. Here, It Is Written As "Interface Wlan1 Down". Here, "Handshake File Captured" Will Be Shown To You. If It Shows "Handshake File", It Means That Handshake File Is Captured. For That, First We Will Disconnect This User. As Soon As This User Tries To Connect Back, We Will Get His Password. So, Let'S Open New Tab And We Will Send The Packets. So, We Will Send De-Authentication Packets To Disconnect This User. For That, We Will Write A Command In Which We Will Use Airplay-Ng Package And Here, We Have Written "--Deauth" Which Is Generating The De-Authentication Packets. They Will Be Generated For 10 Seconds Which Means That 10 Requests Will Be Generated. Then In "-A", It Is Mentioned From Whom To Disconnect Which Is The Mac Address Of Our Hotspot Whose Password We Want. And The System To Which We Have To Disconnect Is Mentioned In "-C".
So, We Had To Disconnect This User From Our Hotspot. You Can See That, We Had To Disconnect This User From Our Hotspot. We Have Filled The Details To Disconnect It. And We Have Specified The Interface At The End. As Soon As We Press "Enter", The De-Authentication Packets Will Be Sent And That User Will Be Disconnected. So, You Can See That The User Tried To Connect Again After Getting Disconnected. And We Have Captured Wpa Handshake. The Mac Address Is Written In Front Of It. It Tells That We Have Captured The Handshake File Of Our Hotspot. Now, We Have To Crack This Handshake File. So, Is This Session, We Have Seen That Without Connecting To A Network And By Taking Our System In Monitor Mode, We Can See The Data In The Surrounding Networks. Then, We Can Disconnect Any Of Its User. It Means That We Are Doing Wi-Fi Jamming Here. We Are Disconnecting Any User And It Can'T Use Wi-Fi Until We Want. If I Wrote Here "100" Instead Of "10", What Would Happen In That Case? It Means That Until These 100 Requests Are Sent, This User Can'T Connect. It Means That We Are Not Letting This User To Connect. So, This Is Wi-Fi Jamming. We Have Seen Wi-Fi Monitoring. By Setting Ourselves In Monitor Mode, Without Even Connecting To Any Wi-Fi We Have Disconnected A User, Read And Captured His Data. Now, The Process Of Wi-Fi Cracking Comes. If Your Wi-Fi Is Old Or If It'S New Like Wpa Or Wpa 2 Then The Difference Between These 2 Is That In The Old Wi-Fi, The Password That Used To Be Sent In The Handshake Files Wasn'T Encrypted. That Was Easily Readable. Hence, It Could Be Cracked Easily.
But The Passwords That Are Sent In Wi-Fi In Wpa 2 Are Encrypted Which Use Wpa 2 Encryption. Here, We Have To Crack That. There Are 2 Processes For That. Let'S Start The Process To Crack It. We Have Already Captured The Handshake File. So, We Will Let This Process Run For Now. Now, We Will Type "Ls" And Hit "Enter" To See The Place Where That File Is Captured. Our File Name Was "Hacked". We Will See In "Hacked". You Can See That The Files Named "Hacked" Are Generated Because The Process Was Stopped Once And It Was Again Started. So, The "02" File Is Useful For Us And Among These, The File "Hacked-02" Is Useful For Us Which Is .Cap File. Our Handshake File Is Captured In Capture File. We Need This File Only. Our Password Is In This File Only. And We Have To Crack This File. We Can Use 2 Things For Cracking. If We Had To Hack An Old Wi-Fi I.E. If It Had Been The Wi-Fi Before Wpa I.E. Wps Then How Would We Have Cracked It? There Is An Easy Process To Crack That. We Have To Write "Aircrack-Ng" Then The File Name. As Soon As We Write The File Name And Hit "Enter", Aircrack-Ng Tried To Attach Its Wordlist But It Was Not Wpa. It Was Wpa 2. This Encryption Technique Was An Advanced One And Encryption Was Involved In This. Hence, It Could Not Crack It.
And Since It Could Not Read Its Password By Default, It Will Ask Us For A Word List. You Crack It Through A Word List Because It Is Wpa 2. So, Now We Will Attach A Word List Here Which We Will Attach Using "-W". We Have A Word List In Our Kali Linux Machine With The Name "Rocky.Txt" Which Is A Very Useful Word List In Which, There Are Good Passwords Already Present. It Is Very Good List. So, We Will Try To Crack It Using This Word List Only. For That, We Will Write Its Directory As: User/ Share/ Wordlists/ And Then "Rocky.Txt". You Can See Here That Its Proper Location Is "Usr/Share/Wordlists/Rocky.Txt". If You Are Using For The First Time Then Keep One Thing In Mind That This Rocky.Txt File Is A Zip File. You Have To Unzip It. For That, You Will Run The Command "Cd" And Enter In "Usr/Share/Wordlists" And If "Rocky.Txt" File Is Zipped Then You Will Unzip It By Writing Unzip Command. Then, You Give This Location Here. As Soon As I Press "Enter", It Has Cracked The Password So Fast. As Of Now, My Password Was "Password". So, It Has Cracked It.
And It Cracked It With A Very Fast Speed. Aircrack-Ng Does The Task Of Cracking Very Fast. Even If There Is Some Typical Password In This Wordlist, It Will Perform Good And It Will Crack The Password. This Was For Demo. We Will See How To Generate A Good Word List In The Cracking Section Ahead. We Will Focus On That And Understand That Also. That'S It For Today. We Have Seen How The Wi-Fi Is Working, How Handshake File Is Being Sent And How We Can Capture Any Handshake File By Going In The Monitor Mode. We Saw How To Disconnect Any User For Any Time Without Even Connecting To That Hotspot. Friends, I Hope That You Liked Today'S Video. Let'S Meet With One More New Video Tomorrow. If You Have Not Subscribed Yet Then Do It Now. Thank You.🙂

No comments: