
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Airodump-ng Archives - TECHNIG</title>
	<atom:link href="https://www.technig.com/tag/airodump-ng/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.technig.com/tag/airodump-ng/</link>
	<description>Gateway for IT Experts and Tech Geeks</description>
	<lastBuildDate>Mon, 01 Jun 2020 11:57:13 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.2</generator>

<image>
	<url>https://www.technig.com/wp-content/uploads/2020/04/32x32.png</url>
	<title>Airodump-ng Archives - TECHNIG</title>
	<link>https://www.technig.com/tag/airodump-ng/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">162720667</site>	<item>
		<title>5 ways to Hack Wireless Network</title>
		<link>https://www.technig.com/5-ways-to-hack-wireless-network/</link>
					<comments>https://www.technig.com/5-ways-to-hack-wireless-network/#comments</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Fri, 28 Nov 2014 19:17:17 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Aircrack-ng]]></category>
		<category><![CDATA[Airmon-ng]]></category>
		<category><![CDATA[Airodump-ng]]></category>
		<category><![CDATA[Crack WPA2]]></category>
		<category><![CDATA[Crunch]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[Password List]]></category>
		<category><![CDATA[Wifite]]></category>
		<category><![CDATA[Wireless Hacking]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=259</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2014/11/Wireless-Hacking-and-Penetration-Testing.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Wireless Hacking and Penetration Testing" decoding="async" fetchpriority="high" srcset="https://www.technig.com/wp-content/uploads/2014/11/Wireless-Hacking-and-Penetration-Testing.jpg 840w, https://www.technig.com/wp-content/uploads/2014/11/Wireless-Hacking-and-Penetration-Testing-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2014/11/Wireless-Hacking-and-Penetration-Testing-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div>
<p>In previews article about securing or Hack Wireless Network &#8220;5 Steps to Secure your home Wireless Network&#8221; we understand pretty enough for securing home Wireless Network. But now it&#8217;s time to know how the hackers break and get access to your Wireless Access Point WAP? In this article, I&#8217;m going to show you 5 ways [&#8230;]</p>
<p>The post <a href="https://www.technig.com/5-ways-to-hack-wireless-network/">5 ways to Hack Wireless Network</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2014/11/Wireless-Hacking-and-Penetration-Testing.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Wireless Hacking and Penetration Testing" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2014/11/Wireless-Hacking-and-Penetration-Testing.jpg 840w, https://www.technig.com/wp-content/uploads/2014/11/Wireless-Hacking-and-Penetration-Testing-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2014/11/Wireless-Hacking-and-Penetration-Testing-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div><p>In previews article about securing or Hack Wireless Network &#8220;<a href="https://www.technig.com/5-steps-to-secure-your-home-wireless-network/" target="_blank" rel="noopener noreferrer">5 Steps to Secure your home Wireless Network</a>&#8221; we understand pretty enough for securing home Wireless Network. But now it&#8217;s time to know how the hackers break and get access to your Wireless Access Point WAP?</p>
<p>In this article, I&#8217;m going to show you 5 ways to pen test a wireless network. It&#8217;s all for educational purpose only.</p>
<p>The Tools we need is Kali Linux or Backtrack. Download the latest Kali Linux from <a href="https://www.kali.org/downloads/">here</a>.</p>
<p><strong>First one</strong> is using Wifite to capture Wireless traffic and save it as a file, and next crack the saved Client handshake in the file with aircrack and creating word list with Crunch.</p>
<p>In order to do this, open terminal and type wifite and hit enter.</p>
<figure id="attachment_261" aria-describedby="caption-attachment-261" style="width: 846px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2014/11/Wifite-Result.png"><img decoding="async" class="wp-image-261 size-full" src="https://www.technig.com/wp-content/uploads/2014/11/Wifite-Result.png" alt="Wifite Result" width="846" height="293" srcset="https://www.technig.com/wp-content/uploads/2014/11/Wifite-Result.png 846w, https://www.technig.com/wp-content/uploads/2014/11/Wifite-Result-300x104.png 300w, https://www.technig.com/wp-content/uploads/2014/11/Wifite-Result-768x266.png 768w" sizes="(max-width: 846px) 100vw, 846px" /></a><figcaption id="caption-attachment-261" class="wp-caption-text">Wifite Result</figcaption></figure>
<p>Let the Wifite search and find all Wireless SSIDs.</p>
<p>When you find them press Ctrl+C to stop searching and select the number of networks you want to hack it.</p>
<figure id="attachment_260" aria-describedby="caption-attachment-260" style="width: 838px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2014/11/Searching-Wireless-Access-Point.png"><img decoding="async" class="wp-image-260 size-full" src="https://www.technig.com/wp-content/uploads/2014/11/Searching-Wireless-Access-Point.png" alt="Searching Wireless Access Point" width="838" height="288" srcset="https://www.technig.com/wp-content/uploads/2014/11/Searching-Wireless-Access-Point.png 838w, https://www.technig.com/wp-content/uploads/2014/11/Searching-Wireless-Access-Point-300x103.png 300w, https://www.technig.com/wp-content/uploads/2014/11/Searching-Wireless-Access-Point-768x264.png 768w" sizes="(max-width: 838px) 100vw, 838px" /></a><figcaption id="caption-attachment-260" class="wp-caption-text">Searching Wireless Access Point</figcaption></figure>
<p>In the point of WPS Attack, press Ctrl+C to reject the WPS Attack.</p>
<figure id="attachment_262" aria-describedby="caption-attachment-262" style="width: 822px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2014/11/Reject-WPS-attack.png"><img loading="lazy" decoding="async" class="wp-image-262 size-full" src="https://www.technig.com/wp-content/uploads/2014/11/Reject-WPS-attack.png" alt="Reject WPS attack" width="822" height="145" srcset="https://www.technig.com/wp-content/uploads/2014/11/Reject-WPS-attack.png 822w, https://www.technig.com/wp-content/uploads/2014/11/Reject-WPS-attack-300x53.png 300w, https://www.technig.com/wp-content/uploads/2014/11/Reject-WPS-attack-768x135.png 768w" sizes="(max-width: 822px) 100vw, 822px" /></a><figcaption id="caption-attachment-262" class="wp-caption-text">Reject WPS attack</figcaption></figure>
<p>Wifite forced the clients to authenticate with WAP by sending de-authenticate request.</p>
<figure id="attachment_263" aria-describedby="caption-attachment-263" style="width: 847px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2014/11/Send-de-authenticate-request.png"><img loading="lazy" decoding="async" class="wp-image-263 size-full" src="https://www.technig.com/wp-content/uploads/2014/11/Send-de-authenticate-request.png" alt="Send de-authenticate request" width="847" height="96" srcset="https://www.technig.com/wp-content/uploads/2014/11/Send-de-authenticate-request.png 847w, https://www.technig.com/wp-content/uploads/2014/11/Send-de-authenticate-request-300x34.png 300w, https://www.technig.com/wp-content/uploads/2014/11/Send-de-authenticate-request-768x87.png 768w" sizes="(max-width: 847px) 100vw, 847px" /></a><figcaption id="caption-attachment-263" class="wp-caption-text">Send de-authenticate request</figcaption></figure>
<p>Authentication is the process of sending user name and password from client to WAP. When the clients send request, the packet will be captured by Wifite. It continues lessening for handshake&#8230;</p>
<figure id="attachment_264" aria-describedby="caption-attachment-264" style="width: 806px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2014/11/Lessening-for-client-handshake.png"><img loading="lazy" decoding="async" class="wp-image-264 size-full" src="https://www.technig.com/wp-content/uploads/2014/11/Lessening-for-client-handshake.png" alt="Lessening for client handshake" width="806" height="93" srcset="https://www.technig.com/wp-content/uploads/2014/11/Lessening-for-client-handshake.png 806w, https://www.technig.com/wp-content/uploads/2014/11/Lessening-for-client-handshake-300x35.png 300w, https://www.technig.com/wp-content/uploads/2014/11/Lessening-for-client-handshake-768x89.png 768w" sizes="(max-width: 806px) 100vw, 806px" /></a><figcaption id="caption-attachment-264" class="wp-caption-text">Lessening for client handshake</figcaption></figure>
<p>Now it found, captured and saved a handshake packets.</p>
<figure id="attachment_266" aria-describedby="caption-attachment-266" style="width: 853px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2014/11/New-handshake-found-and-captured.png"><img loading="lazy" decoding="async" class="wp-image-266 size-full" src="https://www.technig.com/wp-content/uploads/2014/11/New-handshake-found-and-captured.png" alt="New handshake found and captured" width="853" height="381" srcset="https://www.technig.com/wp-content/uploads/2014/11/New-handshake-found-and-captured.png 853w, https://www.technig.com/wp-content/uploads/2014/11/New-handshake-found-and-captured-300x134.png 300w, https://www.technig.com/wp-content/uploads/2014/11/New-handshake-found-and-captured-768x343.png 768w" sizes="(max-width: 853px) 100vw, 853px" /></a><figcaption id="caption-attachment-266" class="wp-caption-text">New handshake found and captured</figcaption></figure>
<p>Now try to crack the captured files with Aircrack and Crunch. To do this type the commands like the screenshot and press enter.</p>
<figure id="attachment_267" aria-describedby="caption-attachment-267" style="width: 957px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2014/11/Create-Wordlist-and-Cracking.png"><img loading="lazy" decoding="async" class="wp-image-267 size-full" src="https://www.technig.com/wp-content/uploads/2014/11/Create-Wordlist-and-Cracking.png" alt="Create Wordlist and Cracking" width="957" height="32" srcset="https://www.technig.com/wp-content/uploads/2014/11/Create-Wordlist-and-Cracking.png 957w, https://www.technig.com/wp-content/uploads/2014/11/Create-Wordlist-and-Cracking-300x10.png 300w, https://www.technig.com/wp-content/uploads/2014/11/Create-Wordlist-and-Cracking-768x26.png 768w" sizes="(max-width: 957px) 100vw, 957px" /></a><figcaption id="caption-attachment-267" class="wp-caption-text">Create Wordlist and Cracking</figcaption></figure>
<p>With the Crunch create password list and the aircrack check them to find the password.</p>
<figure id="attachment_269" aria-describedby="caption-attachment-269" style="width: 689px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2014/11/Cracking-Process.png"><img loading="lazy" decoding="async" class="wp-image-269 size-full" src="https://www.technig.com/wp-content/uploads/2014/11/Cracking-Process.png" alt="Cracking Process" width="689" height="365" srcset="https://www.technig.com/wp-content/uploads/2014/11/Cracking-Process.png 689w, https://www.technig.com/wp-content/uploads/2014/11/Cracking-Process-300x159.png 300w" sizes="(max-width: 689px) 100vw, 689px" /></a><figcaption id="caption-attachment-269" class="wp-caption-text">Cracking Process</figcaption></figure>
<p>It takes time too much just for numbers but be patent, and if you try to crack alphabets it&#8217;s possible but needs more time and a strong processor.</p>
<p>The Second way: Using airmon-ng to set the wireless card to monitoring mode and airodump-ng for capturing clients handshake. For cracking again you must use aircrack with a password list.</p>
<p>Continue&#8230;</p>
<p>The post <a href="https://www.technig.com/5-ways-to-hack-wireless-network/">5 ways to Hack Wireless Network</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/5-ways-to-hack-wireless-network/feed/</wfw:commentRss>
			<slash:comments>21</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">259</post-id>	</item>
	</channel>
</rss>
