# replace -c and - bssid values with the values of your target network We capture this handshake by directing airmon-ng to monitor traffic on the target network using the channel and bssid values discovered from the previous command. These handshakes occur whenever a device connects to the network, for instance, when your neighbor returns home from work. You don’t have to know anything about what that means, but you do have to capture one of these handshakes in order to crack the network password. WPA/WPA2 uses a 4-way handshake to authenticate devices to the network. Remember the BSSID MAC address and channel ( CH) number as displayed by airodump-ng, as we will need them both for the next step. #HOW TO CRACK WIFI PASSWORDS USING MAC PASSWORD#WPA2 CCMP PSK Comcast_2EEA-EXT BC:EE:7B:8F:48:28 -85 119 10 0 1 54e WPA2 CCMP PSK root EC:1A:59:36:AD:CA -86 210 28 0 1 54e WPA2 CCMP PSK belkin.dcaįor the purposes of this demo, we will choose to crack the password of my network, “hackme”. You should see output similar to what is below. Start listening to 802.11 Beacon frames broadcast by nearby wireless routers using your monitor interface: airodump-ng mon0 You should now see a new monitor mode interface listed (likely mon0 or wlan0mon). Next, we will place the interface into monitor mode: airmon-ng start wlan0 We will assume your wireless interface name is wlan0 but be sure to use the correct name if it differs from this. If you do not see an interface listed then your wireless card does not support monitor mode □ See here for more info.)īegin by listing wireless interfaces that support monitor mode with: airmon-ng
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |