
<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Wireless Hacking Archives - TECHNIG</title>
	<atom:link href="https://www.technig.com/tag/wireless-hacking/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.technig.com/tag/wireless-hacking/</link>
	<description>Gateway for IT Experts and Tech Geeks</description>
	<lastBuildDate>Mon, 01 Jun 2020 11:57:13 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.2</generator>

<image>
	<url>https://www.technig.com/wp-content/uploads/2020/04/32x32.png</url>
	<title>Wireless Hacking Archives - TECHNIG</title>
	<link>https://www.technig.com/tag/wireless-hacking/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">162720667</site>	<item>
		<title>Top 10 Password Cracking Tools</title>
		<link>https://www.technig.com/password-cracking-tools/</link>
					<comments>https://www.technig.com/password-cracking-tools/#comments</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Tue, 03 Oct 2017 10:20:28 +0000</pubDate>
				<category><![CDATA[Download]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Password Cracking Tools]]></category>
		<category><![CDATA[Recover Password]]></category>
		<category><![CDATA[Web Application]]></category>
		<category><![CDATA[Web Application Security]]></category>
		<category><![CDATA[Wireless Hacking]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=2389</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2015/04/Top-10-Password-Cracking-Tools.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Password Cracking Tools" decoding="async" fetchpriority="high" srcset="https://www.technig.com/wp-content/uploads/2015/04/Top-10-Password-Cracking-Tools.jpg 840w, https://www.technig.com/wp-content/uploads/2015/04/Top-10-Password-Cracking-Tools-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2015/04/Top-10-Password-Cracking-Tools-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div>
<p>A simple detail about password cracking tools from the wiki. In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system. A standard approach (brute-force attack) is to try guesses repeatedly for the password and check them against an available cryptographic [&#8230;]</p>
<p>The post <a href="https://www.technig.com/password-cracking-tools/">Top 10 Password Cracking Tools</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2015/04/Top-10-Password-Cracking-Tools.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Password Cracking Tools" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2015/04/Top-10-Password-Cracking-Tools.jpg 840w, https://www.technig.com/wp-content/uploads/2015/04/Top-10-Password-Cracking-Tools-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2015/04/Top-10-Password-Cracking-Tools-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div><p>A simple detail about password cracking tools from the wiki. In cryptanalysis and computer security, <b>password cracking</b> is the process of recovering passwords from data that have been stored in or transmitted by a computer system. A standard approach (brute-force attack) is to try guesses repeatedly for the password and check them against an available cryptographic hash of the password. Password cracker is not hacking a password; this software only recovers your password. Got it? So don&#8217;t use against someone&#8217;s system or illegally.</p>
<p>The other purposes of password cracking tools might be to help a user recover a <a title="How to reset forgotten Windows 10 Password?" href="https://www.technig.com/reset-forgotten-windows-10-password/" rel="noopener">forgotten password</a> of a system or any software. But in the world of hacking, hackers are using such a tools to break or crack the stolen password hashes of a database. Or using them to <a title="5 ways to Hack Wireless Network" href="https://www.technig.com/5-ways-to-hack-wireless-network/" rel="noopener">hack the wireless network</a> and crack the passwords. So hope you completely understand the primary purpose of password cracking tools.</p>
<p><strong>List of Top 10 Password Cracking Tools:</strong></p>
<ol>
<li>OphCrack</li>
<li>RainbowCrack</li>
<li>HashCat</li>
<li>Cain &amp; Abel</li>
<li>Wfuzz Password Cracking Tools</li>
<li>Brutus Password Cracking Tools</li>
<li>John the Ripper</li>
<li>THC Hydra</li>
<li>L0phtCrack</li>
<li>Aircrack-NG</li>
</ol>
<figure id="attachment_2368" aria-describedby="caption-attachment-2368" style="width: 301px" class="wp-caption aligncenter"><a href="http://3.90.216.52/wp-content/uploads/2015/04/OphCrack-Password-Cracking-Tools.jpg"><img decoding="async" class="wp-image-2368" src="http://3.90.216.52/wp-content/uploads/2015/04/OphCrack-Password-Cracking-Tools.jpg" alt="OphCrack" width="301" height="116" /></a><figcaption id="caption-attachment-2368" class="wp-caption-text">OphCrack</figcaption></figure>
<h4>#1. OphCrack</h4>
<p>It is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms. See some features of Ophcrack password cracking tools. The uploaded version of Ophcrack compiled for Windows 64-bit platforms. This version can preload tables using the whole RAM available instead of the only 2GB on 32-bit platforms.</p>
<h4>Features:</h4>
<ul style="list-style-type: circle;">
<li>Runs on Windows, Linux/Unix, Mac OS X, &#8230;</li>
<li>Cracks LM and NTLM hashes.</li>
<li>Free tables available for Windows XP and Vista/7/8.1.</li>
<li>Brute-force module for simple passwords.</li>
<li>Audit mode and CSV export.</li>
<li>Real-time graphs to analyse the passwords.</li>
<li>Live CD available to simplify the cracking.</li>
<li>Dumps and loads hashes from encrypted SAM recovered from a Windows partition.</li>
<li>Free and open source software (GPL).</li>
</ul>
<p>Download the latest Ophcrack version from <strong><a href="http://ophcrack.sourceforge.net/" rel="noopener">Sourceforge</a></strong>, the open source software storage.</p>
<figure id="attachment_2370" aria-describedby="caption-attachment-2370" style="width: 260px" class="wp-caption aligncenter"><a href="http://3.90.216.52/wp-content/uploads/2015/04/RainbowCrack-Password-Cracking-Tools.jpg"><img decoding="async" class="wp-image-2370 size-full" src="http://3.90.216.52/wp-content/uploads/2015/04/RainbowCrack-Password-Cracking-Tools.jpg" alt="RainbowCrack" width="260" height="101" /></a><figcaption id="caption-attachment-2370" class="wp-caption-text">RainbowCrack</figcaption></figure>
<h4><strong>2. RainbowCrack</strong></h4>
<p>The RainbowCrack password cracking tools is a general propose implementation of Philippe Oechslin&#8217;s faster time-memory trade-off technique. It cracks hashes with rainbow tables. RainbowCrack uses time-memory tradeoff algorithm to crack hashes. It differs from brute force hash crackers.</p>
<p>A brute force hash cracker generates all possible plaintexts and compute the corresponding hashes on the fly, then compare the hashes with the hash to be cracked. Once a match is found, the plaintext is found. If all possible plaintexts are tested, and no match is found, the plaintext is not found. With this type of hash cracking, all intermediate computation results are discarded.</p>
<h4>Features:</h4>
<ul style="list-style-type: circle;">
<li>Full time-memory tradeoff tool suites, including rainbow table generation, sort, conversion and lookup</li>
<li>Support rainbow table of any hash algorithm</li>
<li>Support rainbow table of any charset</li>
<li>Support rainbow table in raw file format (.rt) and compact file format (.rtc)</li>
<li>Computation on multi-core processor support</li>
<li>GPU acceleration with NVIDIA GPUs (CUDA technology)</li>
<li>GPU acceleration with AMD GPUs (OpenCL technology)</li>
<li>GPU acceleration with multiple GPUs</li>
<li>Runs on Windows operating systems</li>
<li>Windows XP 32-bit / 64-bit</li>
<li>Windows Vista 32-bit / 64-bit</li>
<li>Windows 7 32-bit / 64-bit</li>
<li>Windows 8 32-bit / 64-bit</li>
<li>Runs on Linux operating systems (x86 and x86_64)</li>
<li>Unified rainbow table file format on all supported operating systems</li>
<li>Command line user interface</li>
<li>Graphics user interface</li>
</ul>
<p>Download the latest version of RainbowCrack password cracking tools from <a href="http://project-rainbowcrack.com/" rel="noopener">project-rainbowcrack</a> website.</p>
<figure id="attachment_2762" aria-describedby="caption-attachment-2762" style="width: 271px" class="wp-caption aligncenter"><a href="http://3.90.216.52/wp-content/uploads/2015/04/HashCat-Advanced-Password-Recovery.jpg"><img loading="lazy" decoding="async" class="size-full wp-image-2762" src="http://3.90.216.52/wp-content/uploads/2015/04/HashCat-Advanced-Password-Recovery.jpg" alt="HashCat Advanced Password Recovery" width="271" height="146" /></a><figcaption id="caption-attachment-2762" class="wp-caption-text">HashCat Advanced Password Recovery</figcaption></figure>
<h4>3. HashCat</h4>
<p>Hashcat is the world’s fastest CPU-based password recovery tool. While it&#8217;s not as fast as its GPU counterpart <a href="http://hashcat.net/wiki/doku.php?id=oclhashcat" rel="noopener">oclHashcat</a>, extensive lists can be easily split in half with a good dictionary and a bit of knowledge of the command switches.</p>
<p>Hashcat was written somewhere in the middle of 2009. Yes, there were already close-to-perfect working tools supporting rule-based attacks like “PasswordsPro”, “John The Ripper”. However, for some unknown reason, both of them did not support multi-threading. That was the only reason to write Hashcat: To make use of the multiple cores of modern CPUs.</p>
<p><strong>Features: </strong></p>
<ul style="list-style-type: circle;">
<li>Worlds fastest password cracker</li>
<li>Worlds first and only GPGPU based rule engine</li>
<li>Free</li>
<li>Multi-GPU (up to 128 GPUs)</li>
<li>Multi-Hash (up to 100 million hashes)</li>
<li>Multi-OS (Linux &amp; Windows native binaries)</li>
<li>Multi-Platform (OpenCL &amp; CUDA support)</li>
<li>Multi-Algo (see below)</li>
<li>Low resource utilisation, you can still watch movies or play games while cracking</li>
<li>Focuses highly iterated modern hashes</li>
<li>Focuses dictionary based attacks</li>
<li>Supports distributed cracking</li>
<li>Supports pause/resume while cracking</li>
<li>Supports sessions</li>
<li>Supports restore</li>
<li>Supports reading words from file</li>
<li>Supports reading words from stdin</li>
<li>Supports hex-salt</li>
<li>Supports hex-charset</li>
<li>Built-in benchmarking system</li>
<li>Integrated thermal watchdog</li>
<li><a href="http://hashcat.net/oclhashcat/#features-algos" rel="noopener">150+ Algorithms</a> implemented with performance in mind</li>
<li>and much more</li>
</ul>
<p>Download the latest version HashCat from the <a href="http://hashcat.net/oclhashcat/" rel="noopener">oclhashcat</a> website.</p>
<p>&nbsp;</p>
<figure id="attachment_2371" aria-describedby="caption-attachment-2371" style="width: 259px" class="wp-caption aligncenter"><a href="http://3.90.216.52/wp-content/uploads/2015/04/Cain-Abel.png"><img loading="lazy" decoding="async" class="size-full wp-image-2371" src="http://3.90.216.52/wp-content/uploads/2015/04/Cain-Abel.png" alt="Cain &amp; Abel" width="259" height="140" /></a><figcaption id="caption-attachment-2371" class="wp-caption-text">Cain &amp; Abel</figcaption></figure>
<h4>4. Cain &amp; Abel</h4>
<p>It is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords.</p>
<p>It also helps you for recovering wireless network keys, revealing password boxes, uncovering cached passwords and analysing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol&#8217;s standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources. However, it also ships some &#8220;non-standard&#8221; utilities for Microsoft Windows users.</p>
<p>Download the latest version of Cain and Abel from the <strong><a href="http://www.oxid.it/cain.html" rel="noopener">oxit </a></strong>website which creates and support this software.</p>
<figure id="attachment_2373" aria-describedby="caption-attachment-2373" style="width: 399px" class="wp-caption aligncenter"><a href="http://3.90.216.52/wp-content/uploads/2015/04/wfuzz.png"><img loading="lazy" decoding="async" class="size-full wp-image-2373" src="http://3.90.216.52/wp-content/uploads/2015/04/wfuzz.png" alt="wfuzz" width="399" height="107" srcset="https://www.technig.com/wp-content/uploads/2015/04/wfuzz.png 399w, https://www.technig.com/wp-content/uploads/2015/04/wfuzz-300x80.png 300w" sizes="(max-width: 399px) 100vw, 399px" /></a><figcaption id="caption-attachment-2373" class="wp-caption-text">wfuzz</figcaption></figure>
<h4> 5. <strong>Wfuzz Password Cracking Tools </strong></h4>
<p>Time for special password cracking tools for web applications. The Wfuzz password cracking tools is a software designed for brute forcing Web Applications. It can be used for finding resources not linked (directories, servlets, scripts, etc.). Brute force GET and POST parameters for checking a different kind of injections (SQL, XSS, LDAP, etc.), brute-force Forms parameters (User/Password), Fuzzing, etc. See some features below and read full details at the edge-security website.</p>
<h4>Some Features:</h4>
<ul style="list-style-type: circle;">
<li>Multiple Injection points capability with multiple dictionaries</li>
<li>Recursion (When doing directory brute force)</li>
<li>Post, headers and authentication data brute forcing</li>
<li>Output to HTML</li>
<li>Colored output</li>
<li>Hide results by return code, word numbers, line numbers, regex.</li>
<li>Cookies fuzzing</li>
<li>Multithreading</li>
<li>Proxy support</li>
<li>SOCK support</li>
<li>Time delays between requests</li>
<li>Authentication support (NTLM, Basic)</li>
<li>All parameters brute-forcing (POST and GET)</li>
<li>Multiple encoders per payload</li>
<li>Payload combinations with iterators</li>
<li>Baseline request (to filter results against)</li>
<li>Brute force HTTP methods</li>
<li>Multiple proxy support (each request through a different proxy)</li>
<li>HEAD scan (faster for resource discovery)</li>
<li>Dictionaries tailored for known applications (Weblogic, Iplanet, Tomcat, Domino, Oracle 9i,<br />
Vignette, Coldfusion and much more.i<br />
(Many dictionaries are from Darkraver&#8217;s Dirb, www.open-labs.org)s</li>
</ul>
<p>Download the latest version from the <strong><a href="http://www.edge-security.com/wfuzz.php" rel="noopener">edge-security</a></strong> website.</p>
<figure id="attachment_2375" aria-describedby="caption-attachment-2375" style="width: 450px" class="wp-caption aligncenter"><a href="http://3.90.216.52/wp-content/uploads/2015/04/Brutus-Password-Cracking-Tools.jpg"><img loading="lazy" decoding="async" class="size-full wp-image-2375" src="http://3.90.216.52/wp-content/uploads/2015/04/Brutus-Password-Cracking-Tools.jpg" alt="Brutus Password Cracking Tools" width="450" height="140" srcset="https://www.technig.com/wp-content/uploads/2015/04/Brutus-Password-Cracking-Tools.jpg 450w, https://www.technig.com/wp-content/uploads/2015/04/Brutus-Password-Cracking-Tools-300x93.jpg 300w" sizes="(max-width: 450px) 100vw, 450px" /></a><figcaption id="caption-attachment-2375" class="wp-caption-text">Brutus Password Cracking Tools</figcaption></figure>
<h4><strong>6. Brutus Password Cracking Tools</strong></h4>
<p>The Brutus is also a good password cracking tools for the web application, but it is not updated for many years. You might still need a web application password cracker. Brutus was one of the most popular remote online password cracking tools. It claims to be the fastest and most flexible password cracking tool. This tool is free and is only available for Windows systems. It was released back in October 2000.</p>
<p><strong>Features:</strong></p>
<p>Brutus version AET2 is the current release and includes the following authentication types :</p>
<ul style="list-style-type: circle;">
<li><strong>HTTP (Basic Authentication)</strong></li>
<li><strong>HTTP (HTML Form/CGI)</strong></li>
<li><strong>POP3</strong></li>
<li><strong>FTP</strong></li>
<li><strong>SMB</strong></li>
<li><strong>Telnet</strong></li>
<li><strong>Other types such as IMAP, NNTP, NetBus</strong> etc. are freely downloadable from this site and directly imported into your copy of Brutus. You can create your forms or use other peoples.</li>
</ul>
<p><strong>The current release includes the following functionality :</strong></p>
<ul style="list-style-type: disc;">
<li>Multi-stage authentication engine</li>
<li>60 simultaneous target connections</li>
<li>No username, single username and multiple username modes</li>
<li>Password list, combo (user/password) list and configurable brute force modes</li>
<li>Highly customisable authentication sequences</li>
<li>Load and resume position</li>
<li>Import and Export custom authentication types as BAD files seamlessly</li>
<li>SOCKS proxy support for all authentication types</li>
<li>User and password list generation and manipulation functionality</li>
<li>HTML Form interpretation for HTML Form/CGI authentication types</li>
<li>Error handling and recovery capability in resume after crash/failure.</li>
</ul>
<p>If you would like to use this old and out of date tools, download from the <strong><a href="http://www.hoobie.net/brutus/" rel="noopener">hoobie </a></strong>website.</p>
<figure id="attachment_2379" aria-describedby="caption-attachment-2379" style="width: 300px" class="wp-caption aligncenter"><a href="http://3.90.216.52/wp-content/uploads/2015/04/john-the-ripper.png"><img loading="lazy" decoding="async" class="size-medium wp-image-2379" src="https://www.technig.com/wp-content/uploads/2015/04/john-the-ripper-300x159.png" alt="John the Ripper" width="300" height="159" srcset="https://www.technig.com/wp-content/uploads/2015/04/john-the-ripper-300x159.png 300w, https://www.technig.com/wp-content/uploads/2015/04/john-the-ripper.png 500w" sizes="(max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-2379" class="wp-caption-text">John the Ripper</figcaption></figure>
<h4>7. <strong>John the Ripper</strong></h4>
<p>The John the Ripper is a fast opensource password cracking tools, currently available for many flavours of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypts (3) password hash types most commonly found on various Unix systems supported out of the box are Windows LM hashes, plus lots of other hashes and cyphers in the community-enhanced version.</p>
<p>Download John the Ripper from the <a href="http://www.openwall.com/john/" rel="noopener"><strong>openwall</strong> </a>website, the place to bringing security into the open environment.</p>
<figure id="attachment_2382" aria-describedby="caption-attachment-2382" style="width: 300px" class="wp-caption aligncenter"><a href="http://3.90.216.52/wp-content/uploads/2015/04/THC-Hydra.jpg"><img loading="lazy" decoding="async" class="size-medium wp-image-2382" src="https://www.technig.com/wp-content/uploads/2015/04/THC-Hydra-300x178.jpg" alt="THC Hydra" width="300" height="178" srcset="https://www.technig.com/wp-content/uploads/2015/04/THC-Hydra-300x178.jpg 300w, https://www.technig.com/wp-content/uploads/2015/04/THC-Hydra.jpg 306w" sizes="(max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-2382" class="wp-caption-text">THC Hydra</figcaption></figure>
<h4> 8. THC Hydra</h4>
<p>The THC-Hydra is a fast network logon cracker which supports many different services. When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform fast dictionary attacks against more than 30 protocols, including telnet, FTP, HTTP, https, SMB, several databases, and much more.</p>
<p>Download the THC Hydra from <strong><a href="https://www.thc.org/thc-hydra/network_password_cracker_comparison.html" rel="noopener">THC </a></strong>website and see feature sets and services coverage also.</p>
<figure id="attachment_2383" aria-describedby="caption-attachment-2383" style="width: 300px" class="wp-caption aligncenter"><a href="http://3.90.216.52/wp-content/uploads/2015/04/L0phtCrack.jpg"><img loading="lazy" decoding="async" class="size-medium wp-image-2383" src="https://www.technig.com/wp-content/uploads/2015/04/L0phtCrack-300x96.jpg" alt="L0phtCrack" width="300" height="96" srcset="https://www.technig.com/wp-content/uploads/2015/04/L0phtCrack-300x96.jpg 300w, https://www.technig.com/wp-content/uploads/2015/04/L0phtCrack.jpg 342w" sizes="(max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-2383" class="wp-caption-text">L0phtCrack</figcaption></figure>
<h4>9. L0phtCrack</h4>
<p>The L0phtCrack Password Cracking Tools is an alternative to OphCrack. It attempts to crack Windows passwords from hashes. For cracking passwords, it uses Windows workstations, network servers, primary domain controllers, and Active Directory. It also uses a dictionary and brute force attacking for generating and guessing passwords.</p>
<p><strong>Features: </strong></p>
<ul style="list-style-type: circle;">
<li><strong>L0phtCrack</strong> 6 is packed with powerful features such as scheduling, hash extraction from 64 bit Windows versions, multiprocessor algorithms, and networks monitoring and decoding. It is still the easiest to use password auditing and recovery software available.</li>
<li><strong>The range of Target Systems Software</strong> runs On Windows XP and higher. It operates on networks with Windows NT, 2000, XP, Server 2003 R1/R2, Server 2008 R1/R2, on 32- and 64-bit environments, as well as most BSD and Linux variants with an SSH daemon.</li>
<li><strong>Password Scoring</strong></li>
<li><strong>Pre-computed Dictionary Support</strong></li>
<li><strong>Windows &amp; Unix Password Support</strong></li>
<li><strong>Remote password retrieval</strong></li>
<li><strong>Scheduled Scans</strong></li>
<li><strong>Remediation</strong></li>
<li><strong>Updated Vista/Windows 7 Style UI</strong></li>
<li><strong>Executive Level Reporting</strong></li>
<li><strong>Password Risk Status</strong></li>
<li><strong>Password Audit Method</strong></li>
<li><strong>Password Character Sets</strong></li>
<li><strong>Password Length Distribution</strong></li>
<li><strong>Summary Report</strong></li>
</ul>
<p>Download the latest version from <a href="http://www.l0phtcrack.com/download.html" rel="noopener">l0phtcrack </a>website.</p>
<figure id="attachment_2385" aria-describedby="caption-attachment-2385" style="width: 226px" class="wp-caption aligncenter"><a href="http://3.90.216.52/wp-content/uploads/2015/04/aircrack-ng-.jpg"><img loading="lazy" decoding="async" class="size-full wp-image-2385" src="http://3.90.216.52/wp-content/uploads/2015/04/aircrack-ng-.jpg" alt="aircrack-ng" width="226" height="110" /></a><figcaption id="caption-attachment-2385" class="wp-caption-text">Aircrack-ng</figcaption></figure>
<h4><strong>10. Aircrack-NG</strong></h4>
<p>The Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimisations like KoreK attacks, as well as the PTW attack, thus making the attack much faster compared to other WEP cracking tools.</p>
<p>In fact, Aircrack-ng is a set of tools for auditing wireless networks. To secure a Wireless network against Wireless hacking read the article &#8220;<a href="https://www.technig.com/5-steps-to-secure-your-home-wireless-network/" rel="noopener">5 Steps to Secure your home Wireless Network</a>&#8220;.</p>
<p>Download the Aircrack-ng from the <a href="http://www.aircrack-ng.org/" rel="noopener"><strong>Aircrack-ng</strong></a> website, where you can find more information about this Wireless Password Cracking Tools. You might need to read &#8220;<a href="https://www.technig.com/5-ways-to-hack-wireless-network/" rel="noopener">5 ways to Hack Wireless Network</a>&#8221; article that is a good way to secure your Wireless Network.</p>
<figure id="attachment_2386" aria-describedby="caption-attachment-2386" style="width: 300px" class="wp-caption aligncenter"><a href="http://3.90.216.52/wp-content/uploads/2015/04/Footus-Password-Cracking-Tools.jpg"><img loading="lazy" decoding="async" class="size-medium wp-image-2386" src="https://www.technig.com/wp-content/uploads/2015/04/Footus-Password-Cracking-Tools-300x71.jpg" alt="Footus Password Cracking Tools" width="300" height="71" srcset="https://www.technig.com/wp-content/uploads/2015/04/Footus-Password-Cracking-Tools-300x71.jpg 300w, https://www.technig.com/wp-content/uploads/2015/04/Footus-Password-Cracking-Tools.jpg 459w" sizes="(max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-2386" class="wp-caption-text">Footus Password Cracking Tools</figcaption></figure>
<h4>11. Medusa</h4>
<p>The Medusa password Cracking tool is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application:</p>
<p><strong>Features:</strong></p>
<ul style="list-style-type: circle;">
<li>Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.</li>
<li>Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.</li>
<li>Modular design. Each service module exists as an independent .mod file. It means that no modifications are necessary to the core application to extend the supported list of services for brute-forcing.</li>
<li>Multiple protocols supported. Many services are currently supported (e.g. SMB, HTTP, POP3, MS-SQL, SSHv2, among others).</li>
</ul>
<p>Download the latest Medusa tools from the <strong><a href="http://h.foofus.net/?page_id=51" rel="noopener">foofus</a> </strong>website which support the fgdump tool for mass password Auditing of Windows Systems. It is also a best cracking tool.</p>
<h4><strong>Conclusion For Cracking Tools</strong></h4>
<p>These are the most popular tools that hackers are using for cracking password hashes and codes of web applications and operating systems. I&#8217;m sure that there are many important passwords cracking tools that I miss to bring the list, so tell us the name please to complete this list.</p>
<p>If you need more information about such a tools, read the password is cracking section of Certified Ethical Hacking (<a href="http://www.eccouncil.org/Certification/certified-ethical-hacker" rel="noopener">CEH</a>) from the EC-council academy. And the post &#8220;<a href="https://www.technig.com/certification-road-map-for-information-security-and-ethical-hacking/" rel="noopener">Certification Road-map for Information Security</a>&#8221; for security lovers.</p>
<p>The post <a href="https://www.technig.com/password-cracking-tools/">Top 10 Password Cracking Tools</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/password-cracking-tools/feed/</wfw:commentRss>
			<slash:comments>12</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2389</post-id>	</item>
		<item>
		<title>How do I Secure Home Wireless Network and Smart Devices?</title>
		<link>https://www.technig.com/secure-home-wireless-network-devices/</link>
					<comments>https://www.technig.com/secure-home-wireless-network-devices/#comments</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Sat, 05 Dec 2015 16:32:34 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[Wireless Hacking]]></category>
		<category><![CDATA[Wireless Network]]></category>
		<category><![CDATA[Wireless Router]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=4564</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="451" src="https://www.technig.com/wp-content/uploads/2015/12/Secure-Home-Wireless-Network.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Secure Home Wireless Network" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2015/12/Secure-Home-Wireless-Network.jpg 840w, https://www.technig.com/wp-content/uploads/2015/12/Secure-Home-Wireless-Network-300x161.jpg 300w, https://www.technig.com/wp-content/uploads/2015/12/Secure-Home-Wireless-Network-768x412.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div>
<p>Keeping Secure Home Wireless Network is a responsibility of each person at home. Your smart devices like mobile, laptop, tablet etc. may make you ease communication with friends, family and work staffs. But using them without keeping safe and secure is a big risk for your personal data and files. Most users don’t know how [&#8230;]</p>
<p>The post <a href="https://www.technig.com/secure-home-wireless-network-devices/">How do I Secure Home Wireless Network and Smart Devices?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="451" src="https://www.technig.com/wp-content/uploads/2015/12/Secure-Home-Wireless-Network.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Secure Home Wireless Network" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2015/12/Secure-Home-Wireless-Network.jpg 840w, https://www.technig.com/wp-content/uploads/2015/12/Secure-Home-Wireless-Network-300x161.jpg 300w, https://www.technig.com/wp-content/uploads/2015/12/Secure-Home-Wireless-Network-768x412.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div><p>Keeping Secure Home Wireless Network is a responsibility of each person at home. Your smart devices like mobile, laptop, tablet etc. may make you ease communication with friends, family and work staffs. But using them without keeping safe and secure is a big risk for your personal data and files.</p>
<p>Most users don’t know how to secure their smart devices. They think it’s quite enough if the devices will not be lost or steal. It’s just physical security of a device, what about installing apps from non-trusted resource, update the apps, installing any antivirus and anti spyware apps will make your device riskier then stolen or losing.</p>
<p>The below categories are about securing your smart devices at home and work or at public places.</p>
<figure id="attachment_4577" aria-describedby="caption-attachment-4577" style="width: 1047px" class="wp-caption aligncenter"><a href="http://3.90.216.52/wp-content/uploads/2015/12/Secure-Home-Wireless-Network-and-Smart-Devices2.jpg"><img loading="lazy" decoding="async" class="size-full wp-image-4577" src="http://3.90.216.52/wp-content/uploads/2015/12/Secure-Home-Wireless-Network-and-Smart-Devices2.jpg" alt="Secure Home Wireless Network and Smart Devices" width="1047" height="554" srcset="https://www.technig.com/wp-content/uploads/2015/12/Secure-Home-Wireless-Network-and-Smart-Devices2.jpg 1047w, https://www.technig.com/wp-content/uploads/2015/12/Secure-Home-Wireless-Network-and-Smart-Devices2-300x159.jpg 300w, https://www.technig.com/wp-content/uploads/2015/12/Secure-Home-Wireless-Network-and-Smart-Devices2-768x406.jpg 768w, https://www.technig.com/wp-content/uploads/2015/12/Secure-Home-Wireless-Network-and-Smart-Devices2-1024x542.jpg 1024w" sizes="(max-width: 1047px) 100vw, 1047px" /></a><figcaption id="caption-attachment-4577" class="wp-caption-text">Secure Home Wireless Network and Smart Devices</figcaption></figure>
<h3>1. How do I Secure Home Wireless Network?</h3>
<p>Previously we had explained completely in detail about how to secure a home wireless network? From buying a modern Wireless access point or Wireless router that support security protocols and features for home to <a href="https://www.technig.com/how-to-setup-a-home-wireless-network/" target="_blank" rel="noopener noreferrer">setup Wireless network</a> security. I recommend you to read this article which explain the below <a href="https://www.technig.com/5-steps-to-secure-your-home-wireless-network/" target="_blank" rel="noopener noreferrer">steps to secure your home wireless network</a>.</p>
<ul style="list-style-type: circle;">
<li>Change the Wireless Router SSID</li>
<li>Choose a strong password to Secure Home Wireless Network</li>
<li>Enable encryption</li>
<li>Hide your Wireless SSID name</li>
<li>Change the default user name and password of Wireless management interface</li>
<li>Disable remote access for management to secure home wireless network</li>
</ul>
<h3>2. Update Operating System and Apps</h3>
<p>Updating operating system will install the latest critical and security update to patch the OS bugs, solve issues and get better performance. If your smart phone is Android, iOS, Windows Phone or other OS, try to upgrade to the latest version. Also update your mobile Apps too.</p>
<p>Always the latest version lonely is not secure if you don’t have installed any antivirus. Most well-known antivirus will secure your devices against viruses, worms, and spywares. But it will not be keeping it secure from installing pirate apps by you. A pirate app might have some viruses or tracking codes. So don&#8217;t install app from unknown source and  keep your devices OS and Apps up to date for security reasons.</p>
<h3>3. Pirate and Cracked Apps</h3>
<p>A pirate or cracked app might have some viruses or tracking codes to collect your system cookies and personal information illegally. Certainly, most anti virus software collects user information as well, to improve their functionality and performance for upcoming version.</p>
<h3>4. Connecting to Public Internet</h3>
<p>There are a lot of free wireless signal around when you are outside home. Connecting to internet and checking your social media network or emails push you to use these free Internets. Before connecting your mobile, make sure that it should be quite secure or don&#8217;t connect them.</p>
<p>I strongly recommend you that do not connect your mobile to public network when you are not sure about the owners.</p>
<h3>5. Multi User Devices</h3>
<p>For computer, always assign the appropriate permission for users. If you are admin and know computer security, then remove the others from admins group and they will not bring changes to your system without your permission.</p>
<p>Your mobile is always your own and no one should work with. But sometime you can’t  your friends will get your mobile. For this situation apply your own policy. Keep your eyes on person that working with your mobile. If he/she is not care about security, don’t give your mobile or lock it with a secure password.</p>
<p>Most antivirus has builtin app locker to lock your apps. The best one I recommend you is<strong> CM Antivirus</strong>. It will take a photo and send to your email when someone want to enter a wrong password. Yes, that is really fantastic.</p>
<h3>6. Encrypt Your Devices Storage</h3>
<p>Encryption will help you to secure hard disks and memory cards information. It will change the clear data to cipher which non readable data for an unauthorized access. In <a href="https://www.technig.com/enable-bitlocker-drive-encryption/" target="_blank" rel="noopener noreferrer">Windows Bit locker</a> is best and compatible. For mobile devices, do it from settings and encryption section.</p>
<h3>7. Backup Your Personal Files</h3>
<p>This is the most important step’s you should apply on your mobile and computer. A weekly backup schedules will help you to back up your personal files and photos. In case of losing or crash a device, you must have a copy of your files and documents.</p>
<p>In Windows use <a href="https://www.technig.com/backup-data-using-file-history/" target="_blank" rel="noopener noreferrer">File history</a> to back up your personal files. For mobile devices connect to an online could such as <a href="https://www.google.com/drive/" target="_blank" rel="noopener noreferrer">Google Drive</a>, <a href="https://onedrive.live.com" target="_blank" rel="noopener noreferrer">One Drive</a>, or <a href="https://www.icloud.com/" target="_blank" rel="noopener noreferrer">iCloud</a> for backup solution.</p>
<h3>Conclusion</h3>
<p>While you are trying update your system apps and operating system, try to keep update you knowledge as well. Subscribe to security news websites and be aware of most recent information security.</p>
<p><em>Photo credit: OneDrive</em></p>
<p>The post <a href="https://www.technig.com/secure-home-wireless-network-devices/">How do I Secure Home Wireless Network and Smart Devices?</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/secure-home-wireless-network-devices/feed/</wfw:commentRss>
			<slash:comments>5</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4564</post-id>	</item>
		<item>
		<title>5 ways to Hack Wireless Network</title>
		<link>https://www.technig.com/5-ways-to-hack-wireless-network/</link>
					<comments>https://www.technig.com/5-ways-to-hack-wireless-network/#comments</comments>
		
		<dc:creator><![CDATA[Shais]]></dc:creator>
		<pubDate>Fri, 28 Nov 2014 19:17:17 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Aircrack-ng]]></category>
		<category><![CDATA[Airmon-ng]]></category>
		<category><![CDATA[Airodump-ng]]></category>
		<category><![CDATA[Crack WPA2]]></category>
		<category><![CDATA[Crunch]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[Password List]]></category>
		<category><![CDATA[Wifite]]></category>
		<category><![CDATA[Wireless Hacking]]></category>
		<guid isPermaLink="false">https://www.technig.com/?p=259</guid>

					<description><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2014/11/Wireless-Hacking-and-Penetration-Testing.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Wireless Hacking and Penetration Testing" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2014/11/Wireless-Hacking-and-Penetration-Testing.jpg 840w, https://www.technig.com/wp-content/uploads/2014/11/Wireless-Hacking-and-Penetration-Testing-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2014/11/Wireless-Hacking-and-Penetration-Testing-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div>
<p>In previews article about securing or Hack Wireless Network &#8220;5 Steps to Secure your home Wireless Network&#8221; we understand pretty enough for securing home Wireless Network. But now it&#8217;s time to know how the hackers break and get access to your Wireless Access Point WAP? In this article, I&#8217;m going to show you 5 ways [&#8230;]</p>
<p>The post <a href="https://www.technig.com/5-ways-to-hack-wireless-network/">5 ways to Hack Wireless Network</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="margin-bottom:20px;"><img width="840" height="420" src="https://www.technig.com/wp-content/uploads/2014/11/Wireless-Hacking-and-Penetration-Testing.jpg" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="Wireless Hacking and Penetration Testing" decoding="async" loading="lazy" srcset="https://www.technig.com/wp-content/uploads/2014/11/Wireless-Hacking-and-Penetration-Testing.jpg 840w, https://www.technig.com/wp-content/uploads/2014/11/Wireless-Hacking-and-Penetration-Testing-300x150.jpg 300w, https://www.technig.com/wp-content/uploads/2014/11/Wireless-Hacking-and-Penetration-Testing-768x384.jpg 768w" sizes="(max-width: 840px) 100vw, 840px" /></div><p>In previews article about securing or Hack Wireless Network &#8220;<a href="https://www.technig.com/5-steps-to-secure-your-home-wireless-network/" target="_blank" rel="noopener noreferrer">5 Steps to Secure your home Wireless Network</a>&#8221; we understand pretty enough for securing home Wireless Network. But now it&#8217;s time to know how the hackers break and get access to your Wireless Access Point WAP?</p>
<p>In this article, I&#8217;m going to show you 5 ways to pen test a wireless network. It&#8217;s all for educational purpose only.</p>
<p>The Tools we need is Kali Linux or Backtrack. Download the latest Kali Linux from <a href="https://www.kali.org/downloads/">here</a>.</p>
<p><strong>First one</strong> is using Wifite to capture Wireless traffic and save it as a file, and next crack the saved Client handshake in the file with aircrack and creating word list with Crunch.</p>
<p>In order to do this, open terminal and type wifite and hit enter.</p>
<figure id="attachment_261" aria-describedby="caption-attachment-261" style="width: 846px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2014/11/Wifite-Result.png"><img loading="lazy" decoding="async" class="wp-image-261 size-full" src="https://www.technig.com/wp-content/uploads/2014/11/Wifite-Result.png" alt="Wifite Result" width="846" height="293" srcset="https://www.technig.com/wp-content/uploads/2014/11/Wifite-Result.png 846w, https://www.technig.com/wp-content/uploads/2014/11/Wifite-Result-300x104.png 300w, https://www.technig.com/wp-content/uploads/2014/11/Wifite-Result-768x266.png 768w" sizes="(max-width: 846px) 100vw, 846px" /></a><figcaption id="caption-attachment-261" class="wp-caption-text">Wifite Result</figcaption></figure>
<p>Let the Wifite search and find all Wireless SSIDs.</p>
<p>When you find them press Ctrl+C to stop searching and select the number of networks you want to hack it.</p>
<figure id="attachment_260" aria-describedby="caption-attachment-260" style="width: 838px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2014/11/Searching-Wireless-Access-Point.png"><img loading="lazy" decoding="async" class="wp-image-260 size-full" src="https://www.technig.com/wp-content/uploads/2014/11/Searching-Wireless-Access-Point.png" alt="Searching Wireless Access Point" width="838" height="288" srcset="https://www.technig.com/wp-content/uploads/2014/11/Searching-Wireless-Access-Point.png 838w, https://www.technig.com/wp-content/uploads/2014/11/Searching-Wireless-Access-Point-300x103.png 300w, https://www.technig.com/wp-content/uploads/2014/11/Searching-Wireless-Access-Point-768x264.png 768w" sizes="(max-width: 838px) 100vw, 838px" /></a><figcaption id="caption-attachment-260" class="wp-caption-text">Searching Wireless Access Point</figcaption></figure>
<p>In the point of WPS Attack, press Ctrl+C to reject the WPS Attack.</p>
<figure id="attachment_262" aria-describedby="caption-attachment-262" style="width: 822px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2014/11/Reject-WPS-attack.png"><img loading="lazy" decoding="async" class="wp-image-262 size-full" src="https://www.technig.com/wp-content/uploads/2014/11/Reject-WPS-attack.png" alt="Reject WPS attack" width="822" height="145" srcset="https://www.technig.com/wp-content/uploads/2014/11/Reject-WPS-attack.png 822w, https://www.technig.com/wp-content/uploads/2014/11/Reject-WPS-attack-300x53.png 300w, https://www.technig.com/wp-content/uploads/2014/11/Reject-WPS-attack-768x135.png 768w" sizes="(max-width: 822px) 100vw, 822px" /></a><figcaption id="caption-attachment-262" class="wp-caption-text">Reject WPS attack</figcaption></figure>
<p>Wifite forced the clients to authenticate with WAP by sending de-authenticate request.</p>
<figure id="attachment_263" aria-describedby="caption-attachment-263" style="width: 847px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2014/11/Send-de-authenticate-request.png"><img loading="lazy" decoding="async" class="wp-image-263 size-full" src="https://www.technig.com/wp-content/uploads/2014/11/Send-de-authenticate-request.png" alt="Send de-authenticate request" width="847" height="96" srcset="https://www.technig.com/wp-content/uploads/2014/11/Send-de-authenticate-request.png 847w, https://www.technig.com/wp-content/uploads/2014/11/Send-de-authenticate-request-300x34.png 300w, https://www.technig.com/wp-content/uploads/2014/11/Send-de-authenticate-request-768x87.png 768w" sizes="(max-width: 847px) 100vw, 847px" /></a><figcaption id="caption-attachment-263" class="wp-caption-text">Send de-authenticate request</figcaption></figure>
<p>Authentication is the process of sending user name and password from client to WAP. When the clients send request, the packet will be captured by Wifite. It continues lessening for handshake&#8230;</p>
<figure id="attachment_264" aria-describedby="caption-attachment-264" style="width: 806px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2014/11/Lessening-for-client-handshake.png"><img loading="lazy" decoding="async" class="wp-image-264 size-full" src="https://www.technig.com/wp-content/uploads/2014/11/Lessening-for-client-handshake.png" alt="Lessening for client handshake" width="806" height="93" srcset="https://www.technig.com/wp-content/uploads/2014/11/Lessening-for-client-handshake.png 806w, https://www.technig.com/wp-content/uploads/2014/11/Lessening-for-client-handshake-300x35.png 300w, https://www.technig.com/wp-content/uploads/2014/11/Lessening-for-client-handshake-768x89.png 768w" sizes="(max-width: 806px) 100vw, 806px" /></a><figcaption id="caption-attachment-264" class="wp-caption-text">Lessening for client handshake</figcaption></figure>
<p>Now it found, captured and saved a handshake packets.</p>
<figure id="attachment_266" aria-describedby="caption-attachment-266" style="width: 853px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2014/11/New-handshake-found-and-captured.png"><img loading="lazy" decoding="async" class="wp-image-266 size-full" src="https://www.technig.com/wp-content/uploads/2014/11/New-handshake-found-and-captured.png" alt="New handshake found and captured" width="853" height="381" srcset="https://www.technig.com/wp-content/uploads/2014/11/New-handshake-found-and-captured.png 853w, https://www.technig.com/wp-content/uploads/2014/11/New-handshake-found-and-captured-300x134.png 300w, https://www.technig.com/wp-content/uploads/2014/11/New-handshake-found-and-captured-768x343.png 768w" sizes="(max-width: 853px) 100vw, 853px" /></a><figcaption id="caption-attachment-266" class="wp-caption-text">New handshake found and captured</figcaption></figure>
<p>Now try to crack the captured files with Aircrack and Crunch. To do this type the commands like the screenshot and press enter.</p>
<figure id="attachment_267" aria-describedby="caption-attachment-267" style="width: 957px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2014/11/Create-Wordlist-and-Cracking.png"><img loading="lazy" decoding="async" class="wp-image-267 size-full" src="https://www.technig.com/wp-content/uploads/2014/11/Create-Wordlist-and-Cracking.png" alt="Create Wordlist and Cracking" width="957" height="32" srcset="https://www.technig.com/wp-content/uploads/2014/11/Create-Wordlist-and-Cracking.png 957w, https://www.technig.com/wp-content/uploads/2014/11/Create-Wordlist-and-Cracking-300x10.png 300w, https://www.technig.com/wp-content/uploads/2014/11/Create-Wordlist-and-Cracking-768x26.png 768w" sizes="(max-width: 957px) 100vw, 957px" /></a><figcaption id="caption-attachment-267" class="wp-caption-text">Create Wordlist and Cracking</figcaption></figure>
<p>With the Crunch create password list and the aircrack check them to find the password.</p>
<figure id="attachment_269" aria-describedby="caption-attachment-269" style="width: 689px" class="wp-caption aligncenter"><a href="https://www.technig.com/wp-content/uploads/2014/11/Cracking-Process.png"><img loading="lazy" decoding="async" class="wp-image-269 size-full" src="https://www.technig.com/wp-content/uploads/2014/11/Cracking-Process.png" alt="Cracking Process" width="689" height="365" srcset="https://www.technig.com/wp-content/uploads/2014/11/Cracking-Process.png 689w, https://www.technig.com/wp-content/uploads/2014/11/Cracking-Process-300x159.png 300w" sizes="(max-width: 689px) 100vw, 689px" /></a><figcaption id="caption-attachment-269" class="wp-caption-text">Cracking Process</figcaption></figure>
<p>It takes time too much just for numbers but be patent, and if you try to crack alphabets it&#8217;s possible but needs more time and a strong processor.</p>
<p>The Second way: Using airmon-ng to set the wireless card to monitoring mode and airodump-ng for capturing clients handshake. For cracking again you must use aircrack with a password list.</p>
<p>Continue&#8230;</p>
<p>The post <a href="https://www.technig.com/5-ways-to-hack-wireless-network/">5 ways to Hack Wireless Network</a> appeared first on <a href="https://www.technig.com">TECHNIG</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.technig.com/5-ways-to-hack-wireless-network/feed/</wfw:commentRss>
			<slash:comments>21</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">259</post-id>	</item>
	</channel>
</rss>
