In previews article about securing or Hack Wireless Network “5 Steps to Secure your home Wireless Network” we understand pretty enough for securing home Wireless Network. But now it’s time to know how the hackers break and get access to your Wireless Access Point WAP?
In this article, I’m going to show you 5 ways to pen test a wireless network. It’s all for educational purpose only.
The Tools we need is Kali Linux or Backtrack. Download the latest Kali Linux from here.
First one is using Wifite to capture Wireless traffic and save it as a file, and next crack the saved Client handshake in the file with aircrack and creating word list with Crunch.
In order to do this, open terminal and type wifite and hit enter.
Let the Wifite search and find all Wireless SSIDs.
When you find them press Ctrl+C to stop searching and select the number of networks you want to hack it.
In the point of WPS Attack, press Ctrl+C to reject the WPS Attack.
Wifite forced the clients to authenticate with WAP by sending de-authenticate request.
Authentication is the process of sending user name and password from client to WAP. When the clients send request, the packet will be captured by Wifite. It continues lessening for handshake…
Now it found, captured and saved a handshake packets.
Now try to crack the captured files with Aircrack and Crunch. To do this type the commands like the screenshot and press enter.
With the Crunch create password list and the aircrack check them to find the password.
It takes time too much just for numbers but be patent, and if you try to crack alphabets it’s possible but needs more time and a strong processor.
The Second way: Using airmon-ng to set the wireless card to monitoring mode and airodump-ng for capturing clients handshake. For cracking again you must use aircrack with a password list.