Hacking WPA2 Wi-Fi Networks with Aircrack-Ng Suite [Updated 2020]

Sep 16, 2020 02:19 PM
637356680392293927.jpg

Hi all!

The topic for today is: Hacking WPA2 Wi-Fi Networks With Aircrack-Ng Suite

Tools that we will be using:

  1. Airmon-Ng (Place the wireless card in moniter mode)
  2. Airodump-Ng (Start sniffing for packets on Wi-Fi networks)
  3. Aireplay-Ng (Send the de-authentication packets to de-authenticate the users on the Wi-Fi)
  4. Aircrack-Ng (Crack the handshake with the password)

The Original How-To By Master Hacker OccupyTheWeb.

Let's get started.

Firstly, we check if the Linux system recognises our wireless card that we will be using for hacking. I am using the built-in wireless card in my system to hack. My wireless card is capable of monitor mode and packet injection.

How To Select An Aircrack-Ng Compatible Wireless Card.

To check if the system recognises out wireless card, we type:

ifconfig

637357511045359260.jpg

"ifconfig" command.

To check what state the wireless card is in, we type:

iwconfig

It will be stated in the results that the wireless card is in managed mode. Once we have confirmed that, we can proceed with our task.

Now, we want to place the wireless card in monitor mode to sniff for packets, but before that, we will use Airmon-Ng to kill processes that may disrupt our Wi-Fi hacking. So we kill all processes with:

airmon-ng check kill

This command has to be runned before placing the wireless card in monitor mode.

637357519158084140.jpg

"airmon-ng check kill" command

And then we place it in monitor mode with the command:

airmon-ng start

637357519627771542.jpg

"airmon-ng start wlan0" command

We now check if the wireless card is in monitor mode:

ifconfig

637357531835417699.jpg

"ifconfig" command.

iwconfig

637357532237917123.jpg

"iwconfig" command

Now, we can see that my wireless card is in monitor mode and it is ready to be used.

With the wireless card now in monitor mode, we can now proceed to start dumping connections with Airodump-Ng.

airodump-ng

637357527789421154.jpg

"airodump-ng wlan0mon" command

To find networks running on 5Ghz, you can run the command with an additional add-on:

airodump-ng --band a

The additional --band a command tells Airodump-Ng to scan 5Ghz networks only, as 5Ghz networks use 802.11a, while 2.4Ghz networks use 802.11b. Airodump-Ng scans 2.4Ghz networks by default. However

After recognising the Wi-Fi network you are attacking, you can stop this general scan and start running Airodump-Ng on a particular network. However, I am unable to make Aireplay-Ng send de-authentication signals to a 5Ghz network: Any Suggestions On This?

Now that we have most of the 2Ghz networks on our list, we will run Airodump-Ng on a particular network. The command to do that is:

airodump-ng --write --bssid --channel wlan0mon

Once Airodump-Ng is sniffing on that network, we will run Aireplay-Ng to de-authenticate the users on the network to force them to reconnect again. We will then be able to capture a 4-Way-Handshake that we will be cracking. The --write command has to be used or else the handshake will not be saved and you will not be able to crack it. To run Aireplay-Ng, the command is:

aireplay-ng -a --deauth

This command will then start to send de-authentication packets to the Wi-Fi network. If you want to keep on sending de-authentication packets to the Wi-Fi network, you can put the number "0" after the --deauth command.

Once we have captured the handshake, we can stop Airodump-Ng and Aireplay-Ng. You can then use a wordlist which you have created to brute-force the handshake. To brute-force that handshake with Aircrack-Ng, use this command:

aircrack-ng -w

The -w command for Aircrack-Ng tells Aircrack-Ng what wordlist to use. However, suffice to say, if the password for the Wi-Fi network is not in your wordlist, you will not be able to crack the handshake. If you need a more targeted wordlist, you can consider using a tool called C.U.P.P which I will be covering in the next How-To.

I hope that this article has helped to simplify matters for you on Wi-Fi hacking. If you have any other questions, you can ask them in the comments section and I will try my best to answer them. If there are any mistakes in the article, please feel free to point them out to me. Till next time guys! Keep hacking ethically and never ever give up.

Yours sincerely,

vH

Just updated your iPhone? You'll find new Apple Intelligence capabilities, sudoku puzzles, Camera Control enhancements, volume control limits, layered Voice Memo recordings, and other useful features. Find out what's new and changed on your iPhone with the iOS 18.2 update.

Comments

No Comments Exist

Be the first, drop a comment!