Working Wi-Fi hacking methods in 2020 - ethical hacking and penetration testing

Working Ways to Hack Wi-Fi in 2020

Is it possible to hack Wi-Fi now?

Earlier, under the articles on the audit of the security of Wi-Fi networks, they left comments in the spirit of "what are you doing here, you won't pick up a password in a thousand years." And this seems to be a correct statement, but if I just need access to the Internet, then practice in different cities and even different countries shows the same result: you can ALWAYS get a password from Wi-Fi.

We have two factors for us:

1. We don't need to hack a specific Wi-Fi network or all networks. It is enough for us to find one weak Access Point with an acceptable signal level

2. There are several very effective ways, and if you apply all of them, then you will almost certainly be able to find a Wi-Fi network that will succumb to

And while doing this, I caught myself thinking that I was not using my own online book "Hacking Wi-Fi networks with Kali Linux and BlackArch", in reality, I use several methods, and I look into the book only as a hint for long commands, for example , for hashcat. In general, at first I wanted to make an extract of commands that I cannot remember, so that it would be something like a cheat sheet. But then the idea came up to collect all the most effective techniques, which together always bring me results.

This will be a cheat sheet for me and for beginners, since most of the methods are pretty simple and almost all are fast.

That is, on the one hand, this article will not contain any new methods that would not have been previously considered on HackWare.ru, but, on the other hand, there will be something like a strategy here, when combining the least time-consuming and most effective methods , you can quickly be successful in gaining Internet access in a new location.

Here is an example of collected passwords in my previous place of residence (Asian hinterland with three-story houses):

Lines that start with [+] , mined with OneShot, lines that start with {"result": true, "data": { mined using 3WiFi. 3BB-KANCHANANAT picked up with brute force. Most of the passwords were collected in 20-30 minutes.

What you need to hack Wi-Fi

1. You need a sufficient number of wireless networks. If you live on the edge of a village and you have one Wi-Fi network within your reach, which you can see, it is invisible that there are not very many chances.

The more networks in the area, the better.

2. There are no special hardware requirements, and even Wi-Fi adapters that do not support monitor mode are suitable for some attacks. Nevertheless, I highly recommend adapters with an external antenna, and if the antenna is removable, then it is better to buy another bigger one. IMHO, half of the "skills" of a Wi-Fi cracker in a large antenna ...

Required commands

From now on, I will only say "adapter in monitor mode" or "adapter in controlled mode"; I will not duplicate these commands.

To view the names of the wireless interfaces and their current mode:

iw dev 

To switch the Wi-Fi card to monitor mode:

sudo ip link set <INTERFACE> down 

sudo iw <INTERFACE> set monitor control

sudo ip link set <INTERFACE> up 

If an attack does not need an Internet connection (and some do need it), then it is better to stop the processes that may interfere (when the first command is executed, the Internet connection will be lost):

sudo systemctl stop NetworkManager 

sudo airmon-ng check kill

Return to managed mode:

sudo ip link set <INTERFACE> down 

sudo iw <INTERFACE> set type managed

sudo ip link set <INTERFACE> up

Or just unplug and plug the Wi-Fi adapter - by default it is always enabled in managed mode.

If you stopped NetworkManager, then to start it run:

sudo systemctl start NetworkManager

Finding Hacked Wireless Access Points 

This is the easiest method and does not require a wireless connection, but it does require an Internet connection.

For details, see the article "How to quickly find out the password for Wi-Fi nearby (without monitor mode)".

After the end of the scan, when the seen APs are checked against the database, the Wi-Fi adapter (which performed the scan) is no longer used. That is, while the check is being carried out, you can proceed to the next attack.

If you have another, non-guest 3WiFi account, then in the script itself, replace the API and remove the line

sleep 15;

In this case, the script will not pause between checks.

In Windows, you can use Router Scan by Stas'M to view the BSSID, and then search for 3WiFi. For details, see the article "3WiFi Service: Passwords from Wi-Fi Access Points". If I'm not mistaken, Router Scan can automatically check the Access Points it sees using the 3WiFi database.

Pixie Dust no monitor mode

  • The author of the current mod wrote to me about the OneShot program in a commentary - since then it is my favorite program, I run it even more often than my own WiFi-autopwner script.
  • This program can only receive passwords from APs with WPS enabled, but it does not need monitor mode. With a Pixie Dust attack, the password can be obtained in a matter of seconds. For detailed instructions, see the article "How to hack Wi-Fi with a regular adapter without monitor mode".

For Windows, the analogue is Router Scan by Stas'M, for details see the article "New features of Router Scan by Stas'M v2.60: wireless hacking of Wi-Fi from Windows".

Fast brute force password

Unfortunately, there are not very many access points with WPS enabled. Nevertheless, we will return to them later. Now we will look at the classic variant of capturing a handshake and cracking a password. Its speed is as follows: 

handshakes are automatically captured for all Access Points within reach two types of brute-force are launched with Hashcat: using a dictionary and using an eight-digit mask. Experience shows that quite a few TDs are amenable to. This method also has a good time-to-value ratio. .

We transfer the wireless interface to monitor mode.

We run the command to collect handshakes: 

sudo besside-ng INTERFACE -W All handshakes will be saved to a file wpa.cap If you are going to hack them all, then you can convert everything at once to hashcat format using cap2hccapx: :

cap2hccapx wpa.cap output.hccapx 

If you only need a hash of a specific Access Point, then use the network name (ESSID) as a filter. For example, I'm only interested in the handshake of a Wi-Fi network. netis56 .

and I want to save it to a file

netis56.hccapx

cap2hccapx wpa.cap netis56.hccapx netis56

If you want to split the wpa.cap file into separate handshakes, then use the script from the article "How to extract handshakes from a capture file with several handshakes", and then also convert them with the program

cap2hccapx 

For the dictionary attack, I use the rockyou dictionary, the cleaned version can be downloaded from this link.

  • An example of a successful hacking using a dictionary (hacking time 9 seconds): Another example of a successful dictionary break (break time 13 seconds):
  • My command to run: hashcat --force --hwmon-temp-abort = 100 -m 2500 -D 1,2 -a 0 'HASH.hccapx' / PATH/TO/rockyou_cleaned.txt
  • In this command, the required options are: 'HASH.hccapx'

- your hccapx file with one or more hashes

  • /WAY/TO/rockyou_cleaned.txt - path to the dictionary
  • -m 2500 - the type of hash to be cracked is indicated
  • Optional options: -a 0
  • - type of attack: dictionary attack. May be skipped, since it is assumed by default -D 1.2

- means to use both the CPU and the video card to crack the password. If not specified, most likely only the video card will be selected

--force 

- means to ignore warnings. Without this option, my central processor is not used to crack passwords. Be careful with this option

  • --hwmon-temp-abort = 100 Is the maximum temperature at which brute force will be forcibly interrupted. I have such a climate that during the day in the room it is always more than + 30 ℃, besides, I run brute force on a laptop (I do not recommend doing this on a laptop !!!), so in my conditions the default barrier of + 90 ℃ is achieved very quickly and the busting stops. With this option, set to a temperature higher than the default 90, you can actually burn your computer / video card / laptop. Use exclusively at your own peril and risk - I WARNED YOU !!! Although in practice my temperature reaches 94-96 and then the video card drops the frequencies - apparently, it also has its own limit. To launch a mask attack: .
  • hashcat --force --hwmon-temp-abort = 100 -m 2500 -D 1,2 -a 3 'HASH.hccapx'? d? d? d? d? d? d? d? d New in this command:

? d? d? d? d? d? d? d? d - mask, means eight digits, on my hardware it takes about 20 minutes. To create a mask with more digits, add ? d

-a 3

- means mask attack.

In addition to 8-digit passwords, 9-11-digit passwords are also common (the latter are most often phone numbers, so you can specify the mask as

89? D? D? D? D? D? D? D? D? D

), but each additional digit increases the search time by 10 times.

Hacking WPS by the most likely pins

In addition to the already considered Pixie Dust attack, there is another very interesting attack on Access Points with WPS enabled. The fact is that for some models of routers, pins are generated according to certain algorithms, for example, based on the MAC address of the router or its serial number. Knowing this data, you can generate one or more pins that are highly likely to be suitable for a wireless access point.

Such an attack is implemented in WiFi-autopwner (description here) - this script requires an Internet connection to request PINs online, but a fix is ​​implemented for adapters on the Ralink chipset (most of them).

An example of very quickly hacked Wi-Fi networks using this method:

Another similar attack is implemented in airgeddon. But in this program, WPS attacks do not work with adapters based on Ralink chipsets. In this program, you need to use, for example, Alfa AWUS036NHA (Atheros chipset). Best with the Alfa ARS-N19 antenna. I also use such a bundle.

For other details, see the article "Effective selection of WPS PINs based on known and generated PINs".

Open networks. Bypassing intercepting portals

I haven't seen normal open networks for a very long time. But there are enough intercepting portals.

Many of them can be bypassed using the hack-captive-portals program, for details see the article "A quick, easy and working way to bypass the Captive Portal (hotspot with authorization on the web interface)". For very advanced users, see the article "Bypassing a Captive Portal Using OpenVPN". Wireless adapters for hacking Wi-Fi A good starter option is the Alfa AWUS036NHA with the Alfa ARS-N19 antenna. This is generally a very good Wi-Fi adapter for hacking wireless networks, including attacks on WPS. The disadvantage of this card is that it is rather old and does not support modern protocols.

To support modern protocols, you can choose an Alfa with external antennas from this list.

Attention! Project

WiFiGid.

ru and personally the author of the article Botan does not call for hacking

WiFi! Especially other people's networks !!! This article was written for educational purposes to improve personal information security. Let's live in peace!

Below are both general methods of hacking wireless networks, and instructions or links to them are given. In addition, recommendations are provided to improve the protection of your own home network from possible evil neighbors and other intruders. I hope this article will be useful to all readers. For others, I recommend that you familiarize yourself with the proposed material in more detail and leave your comments.

  1. Content
  2. Hacking methods
  3. Wireless networks combine many technologies. And where there are many technologies, there are also many security technologies. And at the bottom of this "duck in the egg" holes in the security system emerge. And every possible hole has its own method of attack. In this section, I would like to show all possible ways how to hack Wi-Fi and penetrate a wireless network. But which of these options will work depends entirely on the specific situation. In addition, it may happen that the network is completely protected and cannot be hacked at the current time)
  4. Freebie! About how much desire causes a freebie in all people. Everyone wants someone else's internet. But it's one thing to quickly grab a password and brag to classmates or save money on the Internet in a hostel, another thing is to understand the technology itself, which will allow you to access almost any network. Do not run after bragging, only study and understanding of the processes will make you an expert in this area. My task now is to show the scope of possibilities and the creative beauty in this.
  5. The main ways to hack someone else's Wi-Fi:
  6. Unsecured networks.
  7. Manual password selection.
  8. Brute force the password.
  9. Selection of the WPS code.

Phishing.

Database of passwords.

Bypassing filters.

Interception of the "handshake" and its decoding.

In my case, this command looks like this:

Hacking a router and pulling out an open password.

We will briefly try to look at all these methods. I will not go into details much, but if you suddenly have a question - ask it in the comments. Is it possible to hack?

Unsecured networks

Usually nowadays all networks are encrypted and protected with a key. Something like the following picture:

But there are still access points that are not protected in any way. And you can connect to them completely freely - without a password. An example of such a point is public places, the subway.

Recommendation!
Recommendation!

Always protect your home network with a password.

Manual selection

These first two methods are written simply to show that sometimes it is not worth resorting to complex technical actions, because usually everything is in sight, you just have to think a little.

The average user usually sets himself a simple password - try to imagine what he could have entered and guess it. It works great to find out the Wi-Fi password from friends and neighbors. What if you already know some password of your neighbor? People are very fond of repeating themselves, and they usually enter the same thing. Works rarely, but aptly. Especially on old WEP networks, where passwords of less than 8 characters were allowed - there were often both "12345" and "QWERTY".

TOP 25 most common Wi-Fi passwords

Many providers (Rostelecom, ByFly, Yota and others) sometimes use “default” passwords on their models. Look for them on the Internet or on our website, if you are lucky)

  • Brute force
  • Brute Force is a method of automatically brute-force passwords. After all, you enter the password freely? And what to do if you force the program to go through all possible options on its own and try to connect with them.
  • There are pluses - old models break with a bang without detection of an attack and a weak password (WEP). There are downsides - new models can detect you (you have to be masked) and introduce delays in brute force, or even a complete ban of the attacking machine. Another disadvantage is that modern routers force users to enter complex long passwords, which will take years to brute-force. So you have to look for other methods.
  • But still try to sort out the network for light passwords, or if it is WEP, and not WPA / WPA2, it is definitely worth it. The probability of a hole is always there.

Highlights on Brutus:

Programs can use the entire enumeration of options - suitable for a WEP network, or for a router model that forces you to force complex passwords where a dictionary attack is impossible.

There is a variant of a dictionary attack - when a file with the most common passwords is loaded. There are a lot of these files - in one Kali Linux there are a couple of dozen of them, and how many are on the network. For me, it is enough to check for basic passwords with a small list - after all, hacking through brute force is no longer an option, but for a basic check and saving time, the simplest list is enough.

  1. The program works in several threads - i.e. can simultaneously try to iterate over many options at once. But there is a peculiarity here: the router itself can discard such attempts, introduce authorization delays, or completely reboot. Those. streams need to be played carefully. In any situation, check everything on your hardware, so you will find out for sure.
  2. Some people write about proxies ... But what kind of proxy is there))) We connect over the air) The point is that some programs successfully mask their requests for different devices, which makes it possible to work in a multi-thread.
  3. I will give a selection of programs at the end - usually one program like Aircrack (market leader) can do all the actions by itself. No need to reinvent the wheel or install 100,500 programs. In the meantime, I want to continue the discussion with the hacking method.

Interception of the "handshake"

One of the most working methods is to intercept the handshake. What it is? Also a kind of pure brutus, only with a preliminary interception of the cipher and its further attempt to decrypt it. Here's a quick outline:

You sit quietly on the net.

The network is breaking.

Your computer reconnects again.

What happens at the moment of reconnection: your computer re-sends the password to the router, the router accepts it and, if entered successfully, establishes a connection. In practice, this is absolutely imperceptible - neither disconnecting the network, nor entering a password - everything is done automatically by your own system.

This process of sending a password can be called a "handshake" or "handshake". But this method has a drawback - the data is transmitted initially in encrypted form. But with a strong desire, this cipher can still be disassembled into parts (there are even services) and open the password-protected data. And it will take no more time than direct brute-force. This is the whole basis of the method. Aircrack, already familiar to us, can shoot handshake, and HashCat (a brute-force and password generator) can brute-force a password. But you better watch the video above. This is the same way when they calmly break the neighbor's wifi. WPS code

Some routers have that very useless button - WPS, which allows you to connect devices in a simplified mode. By default, many routers still have WPS enabled. And the connection to such a network is carried out just by entering this PIN-code, which consists only of numbers.

The PIN code has only 8 digits. Above, I already talked about the admissibility of a full brute-force WEP brute-force, but here it is even simpler - only numbers. In addition, a correlation was found that allows the methods to make a selection in pairs - first 4 digits, and then 4 digits. All this greatly speeds up the search, and a point with an open WPS can be broken in a few hours.

  1. Another attack option is to use default codes. YES! Some devices come from the factory with the same PIN-code turned on) And the proposed programs already know these passwords, so everything can be much easier.
  2. Recommendation:
  3. disable WPS in your router! It's mostly useless.

Phishing Another interesting method is to display your page from a web user ... Yes, this can be done without being connected to the network. But the substitution can be noticed. The most valid option: .

An access point with the same name of the compromised network is created.

A good signal and name will force the victim to connect to it sooner or later.

After logging in, the password is entered, which successfully comes to you.

In my case, this command looks like this:

The method is working, but here you cannot do without luck. There are also available software implementation methods, for example, using

In my case, this command looks like this:

Wifiphisher

  • Let's take a closer look at this application, because the attack vector is interesting. We need Kali Linux (yes, guys, all the cool free hacking software of any level is there, so put it on). In the terminal, run:

In my case, this command looks like this:

wifiphisher

In my case, this command looks like this:

Immediately after launch, the program starts looking for the nearest networks (all programs with a network hack do this):

Pay attention to the number of networks. Find the one you need in this list and enter its number. Next, various attack scenarios will be proposed: All options are approximately similar, the only difference is that a user of a foreign network will have an authorization or software update. I recommend paying attention to the following points:

Firmware Upgrade Page - you will be prompted to update the firmware of the router itself. It looks interesting and believable, but you just need to enter the same key:

In the meantime, the password arrives in the console like this:

That's all. The approximate use of all programs comes down to this. I will not dwell on one in detail, otherwise the whole book will turn out. I designate attack vectors, give hints - and you already independently study each direction. At the end of the article, I will give an interesting bonus from professional hackers for those who want to go deeper.

Limit access to PIN information, do not enter it on dubious sites.

This process of sending a password can be called a "handshake" or "handshake". But this method has a drawback - the data is transmitted initially in encrypted form. But with a strong desire, this cipher can still be disassembled into parts (there are even services) and open the password-protected data. And it will take no more time than direct brute-force. This is the whole basis of the method. Aircrack, already familiar to us, can shoot handshake, and HashCat (a brute-force and password generator) can brute-force a password. But you better watch the video above. This is the same way when they calmly break the neighbor's wifi. Recommendation:

Be wary if the network to which the device was previously automatically connected without problems asked for a password - especially on third-party pages (software update, password on VKontakte, etc. - this does not happen). Pay attention to duplicate networks at home.

Password databases

There are programs and services that store databases of passwords for public access points. This is especially true for all kinds of cafes in large cities. Do you want to break the cafe? But why, usually someone has already connected to it, which means there is a possibility that the password has floated to the databases.

An example of such a service application is Wi-Fi Map or Router Scan. And the map will show, and the available points, and will connect itself.

make a selection of the service and, in case of suspicion of hacking, check yourself in these databases. It's even easier - change your Wi-Fi password every six months.

Hacking a router

  • Sometimes you have the opportunity to connect via a wire to Wi-Fi, or you know the external IP address from the Internet and can access the router (sometimes it is possible to determine it with a high degree of probability by scanning).
  • Then you can try to guess the password to enter his control panel. Many people leave it by default admin / admin (username / password). And already in the settings, the Wi-Fi password is stored in clear text.

Bypass filters

Some access points will not let you in, simply because you have the wrong ... MAC address. Sometimes it happens. This is no longer about hacking, but sometimes the whole task of hacking boils down to changing the MAC - for example, when you previously successfully connected, but now it does not let you into any one, tk. the administrator or parents banned your device precisely by MAC. The solution is simple - change it.

  1. Sometimes they use:
  2. Black list. Then you just need to change the address to one that is not in this list. Universal program - Macchanger.
  3. White list. Only the devices specified in it are connected. Then you first need to look at these devices and their addresses (Airodump-ng will do), and only after that, adjust for them with the same macchanger.
  4. Network protection

I will highlight some of the problems that you should pay attention to so that no one can connect to your network:

Set a strong password on Wi-Fi.

Put a complex password on the router panel itself.

  • In case of paranoia - enable filtering of MAC addresses, allow only for your devices.
  • Turn off WPS (sometimes called QSS).

Hacking from your phone

All the methods above were mostly about using a PC. Kali Linux is still the optimal environment for hacking - everything is already provided there. The last option is Windows. Phones are much more complicated. While preparing the article, I read "neighboring publications" with recommendations to stick Kali on Apple, or launch free Aircrack-ng on them directly in Android or iOS, and a bonus with a sprinkle of strange keywords - in short, this does not happen in life. If you want to break it - put Kali, if you only have a phone - there will be no cool solution.

Basically, all the recommendations from the network in this field are outright nonsense. My recommendation is to enter something like "wi-fi hacking" into Google Play or the App store, and you will get a whole collection of programs. And there already look at the reviews and do not put any fake rubbish. The main categories of software are here:

  • Bringing the default WPS password.
  • Base points.
  • There will be no selection here - it requires computing power, which phones (and some computers) do not have. So once again - if you want to break from your phone, put Kali on your laptop / computer. Kali is installed on some models of smartphones, but if you are not a pro, don't even try - it's a pointless undertaking.

Responsibility

Many people write about responsibility under a number of articles of the Criminal Code of the Russian Federation: 272, 273, 274. Even at the university they studied this issue and somehow then it all looked suspicious. Here are the titles of the articles:

272 - Illegal access to computer information

273 - Creation, use and distribution of malicious computer programs

274 - Violation of the rules for the operation of storage, processing or transmission of computer information and information and telecommunication networks

  1. In fact, only 272 remain here. But let's take a closer look at it:
  2. Unlawful access to legally protected computer information, if this act entailed the destruction, blocking, modification or copying of computer information.
  3. Please note that the very use of the Internet, if it did not cause any damage, to put it mildly, is difficult to fit here. It's another matter if traffic or time is charged, and you use it ... But nowadays there is no limit on Wi-Fi. Whatever it was, I still categorically do not approve of any villainy in my inner circle - after all, we are all brothers, who if not we.

Programs

There are really few powerful hacking programs for all occasions. I recommend paying attention to the following:

Windows - WiFi Crack

Kali Linux - Aircrack and company. This is the best Wi-Fi hacker, most of the manuals from YouTube are about it, including the video from this article, support absolutely all methods of hacking, you can safely write a separate article. It is ideal to work from a laptop, but you can also work from a computer using Wi-Fi adapters.

Android and iOS - discussed above, look in the markets, for me they are "pseudo-hackers" in case "what if you're lucky."

There are many books out there about hacking Wi-Fi. There are some very specific ones, but incomplete ones. And there are straight very short clippings with all the interesting moments. I decided to share these clippings with you. Books are in English, but they don't write about modern methods in Russian. So from a personal selection. I do not pretend to be authorship, who will like it - pay the authors. There are all the methods above, even a little more, with examples and instructions:

And this is already an entire chapter from the latest EC-Council guide on training ethical hackers. I also snatched from open sources, the information, although in English, is relevant at the moment. Scroll - everything is in pictures and there is even laboratory work. Everything is the same, but beautiful.

WiFiGid.

And here is a video of the last guide a couple of years earlier, but in Russian:

  • I finish on this - look, study. The information above is enough to easily hack any Wi-Fi on any router (and even on a school one). It is only a matter of time and your skills.
  • Free wireless internet is a welcome find for everyone. Hidden Wi-Fi networks in shops, cafes and other public places are sometimes haunted. Some people just want to crack the Wi-Fi password.
  • It is rare to meet a kind person who does not restrict access to their own Internet. It is clear that cafes and hotels attract visitors with free traffic distribution. However, there is Wi-Fi with open access not only in such places, but at a neighbor at the entrance. Either this is a too kind person, or he is by nature very forgetful.
  • What to do if you urgently need the Internet, but there is no money to pay for your own? What tricks did wise hackers come up with? For free use of the nearest Wai-Fai, a serious hacking procedure is ahead. Other ways that could help bypass the authorization are not yet known to the public.
  • What you will not find on the global network, even descriptions of fraudulent activities to obtain free Wi-Fi. If knowledge in the field of Internet technologies is not significant, then it is better to ask a familiar hacker for help. Who can cope on their own, here are some popular ways:

guess the password;

use a special program so that it picks up the "key";

aircrack-ng -a2 -b 4C: ED: FB: 8A: 4F: C0 -w /root/Desktop/ww.txt /root/Desktop/*.cap

get the PIN of the device;

After executing this command, the password cracking process will begin. If the password is successfully cracked, you will see something similar to the following screenshot.

Phishing;

intercept the password.

How to guess the password yourself

Successful password cracking

In each method, you should initially choose the Wi-Fi with the best signal strength. Choosing the first method takes some thought. It is unlikely that the neighboring Wi-Fi is seriously encrypted. If he is far from information technology, an ordinary inexperienced user, then he hardly pondered for a long time about the complexity of the combination. Most likely, he used his date of birth, spouse or child, or maybe even his last name.

When the simplest options with personal information have not passed, you should pay attention to other popular "passwords". Most often, users use the following combinations of numbers - "1234", "1111", "123123" and similar ones, as well as passwords from letters - "qwerty", "password" and others. There are many common combinations for protecting Wi-Fi, the network is full of information on this topic, and specific combinations are also presented.

The method has a significant advantage - simplicity, but there are also disadvantages - the duration of the process. Especially a lot of time will be spent limiting input attempts. If there is such a thing on someone else's Wi-Fi, then after three unsuccessful attempts, the password will have to be entered only a day later.   Password guessing software

How to crack a complex Wi-Fi password? The principle of such programs is simple, they operate by analogy with a person. Only the computer is several times faster and smarter. Programs have entire dictionaries with popular combinations. Sometimes the machine picks up passwords in minutes, sometimes the process takes several days. First, simple versions are used, then complex ones. The recognition time depends on the complexity of the password. This technology is also called "brute force", which means password search.

For acquaintance examples of programs - Aircrack-ng, Wi-Fi Sidejacking, Wi-Fi Unlocker AirSlax and others. There are many of them on the Internet, this is only a small part. By downloading such software, the fraudster himself risks being deceived. Trojans and other troubles will instantly take over your computer.

How do you control the security of your wireless networks?

The idea of ​​plugging in a technique to find a password is ingenious. However, this method also has its drawbacks. The main one is a negative outcome. The selection may go unsuccessful. This means that a too complex combination of symbols, letters and numbers is conceived, which is not yet familiar to such a program.

Read also:

What to do if the router does not distribute the Internet via WiFi?

Obtaining a PIN is a simple task. Why is it worth going to visit and rewrite it from the body of the device for distributing Wi-Fi. The PIN consists entirely of numbers. The device will not always be located in a convenient place, but there is a way out in case of failure.

Another way to get a PIN is to use special programs. You can use, for example, CommView or Blacktrack. This way of hacking password-protected Wi-Fi is not easy. The Wi-Fi device constantly exchanges information packets between other devices that enter its range. The goal is to intercept data.

You need to act through a computer or laptop with powerful hardware, having a Wi-Fi card with the Monitor mode function. Create a bootable disk or flash drive with the distribution of packet capture software, install the shell on the PC. Select a network, and then wait out the process of intercepting about 10,000 packets. First, the program will issue a PIN, and then a password.

Video material on network hacking using third-party software:

VIDEO

Some routers have that very useless button - WPS, which allows you to connect devices in a simplified mode. By default, many routers still have WPS enabled. And the connection to such a network is carried out just by entering this PIN-code, which consists only of numbers.

Tip: Remember your PIN. When the owner changes the password, it will be much easier to guess if you know the PIN.

Change Mac Address

Hacking neighbor's Wi-Fi in 5 minutes: 100% working methods to find out the password

How else to password-protect Wi-Fi? In the presented method, the question is, in principle, irrelevant, sometimes users leave the network open, but put a filter by MAC addresses. This is a specific identifier for each device. You can find out the allowed MAC addresses using a special program. For example, Airdump-ng.

  1. Video:
  2. Having learned the white list of "identifiers", we change ours. To do this, open the "Control Panel", click "Network and Sharing Center", then select "Change the settings of the network adapter". Select the required network connection, go to "Properties". Configure the network - enter the MAC address of 12 characters. Next, restart, and voila, everything worked out.
  3. Phishing is one of the methods of online fraud. It allows you to trick the user into obtaining a username and password. So, having visited the site, you can visit the phishing page and enter your data, which the attacker will take possession of.
  4. Information with secret data about Wi-Fi is found using the WiFiPhisher program.
  5. How does the software work:
  6. Configuring HTTP and HTTPS;

Search for wlan0 and wlan1 wireless networks before connecting to one of them;

DHCP snooping and IP address listing;

Selection of one of the available Wi-Fi points;

A copy of the access point is created and given the same name. The speed of the real point decreases, due to which the user begins to reconnect and gets to the copy.

The browser asks for a password, the user fills in the field and the password falls into the hands of the fraudster via WiFiPhisher.

  1. Video instruction:
  2. The fraudster now has the ability to configure a third-party router. He can change the WPS PIN, view the data for authorization on any resources. With such privileges, it becomes possible to send users of banking services to other sites, getting "theirs".
  3. Tip: In order not to fall for the "phishing" trick, you should always thoroughly double-check the sites you visit.
  4. Options for protecting your own network

The method has a significant advantage - simplicity, but there are also disadvantages - the duration of the process. Especially a lot of time will be spent limiting input attempts. If there is such a thing on someone else's Wi-Fi, then after three unsuccessful attempts, the password will have to be entered only a day later.   As it turned out, there are many options for spying on data from Wi-Fi. Anyone who has a router at home or in the office should make it difficult for third parties to access. Otherwise, everyone runs the risk of being cruelly deceived. We recommend using the following tips:

Kak-vzlomat-parol-ot-Wi-Fi-10.jpg

Come up with a complex combination for a password - at least 10-12 characters, where to take into account the keyboard layout, case, signs and numbers.

Disable WPS, this function remembers authorized users and reconnects them automatically.

Periodically changing the PIN of the device in use, as well as removing the factory inscription from the case.

Kak-vzlomat-parol-ot-Wi-Fi-4.jpg

  • Limit access to PIN information, do not enter it on dubious sites. How to reset Wi-Fi router settings - return factory settings
  • These steps will help you secure your network efficiently. Now it can only be hacked by a hacker with a capital letter. Rest assured that if the hack is successful, it is somewhere nearby. Only the close location of the attacker can lead to a successful outcome. Known data applications of millions of Wi-Fi

Or maybe there is no need to hack a protected Wi-Fi? Users all over the world have created a kind of database with passwords and Wi-Fi points. To access it, you should download a ready-made program and select the desired network. Information is obtained in the following applications:

Wi-Fi Map

- a universal application for any phone platform, it will show the nearest Wi-Fi points and passwords if someone has already connected to the selected network earlier;

Shift WiFi

Kak-vzlomat-parol-ot-Wi-Fi-7-800x349.png

- a popular application for users of the Android system, as well as the previous program, it shows all previously saved passwords to Wi-Fi.

  • Wi-Fi Map app overview:
  • The list of such applications is gradually growing. There is a risk of getting a low-quality product. It is always safer to download software from official and trusted sources.
  • Hacking Wi-Fi from your phone

Today, it is possible to hack a Wi-Fi network even from a mobile gadget. It's even more convenient than with a PC. It is easier to bring the phone closer to the device to be jailbroken. There are tons of free and paid apps out there. Some of them are deception. Paid among themselves may differ in the actualization of the databases. Currently known:

Wi-Fi Prank; WiHask Mobile;

IWep Lite. Wi-Fi Prank

- "brute force" application. For its operation, additional database downloads are required. Then it automatically picks up the correct password. Suitable for Android.

WiHask Mobile

Kak-vzlomat-parol-ot-Wi-Fi-12-800x472.png

- operates according to a specific algorithm, does not require additional databases. Works until hidden password is found. Based on the same brute force technology. Distributed for Android system.

IWep Lite

- searches for a password on iPhone gadgets. An activation procedure is required for the application to work. You need to find a network and select statistics. After that, an automatic search begins until a satisfactory answer with a code.

Responsibility for hacking

No wonder they say that free cheese is only in a mousetrap. These words can be applied to the Internet as well. Free use is legal only in public places, where the thought does not come to mind - is it realistic to hack the available Wi-Fi, since it is in the public domain. Here everyone can use the network to their fullest.

  1. Hacking someone else's apparatus is a different matter. In other words, it is a scam. And such actions are not legal. All criminal violations in our country are limited by laws. All the "smart guys" will find an article in the Criminal Code of the Russian Federation. Don't risk it, connect or pay for your own internet.
  2. That is, it is not possible to determine the real IP of the hacker for ordinary users of Wi-Fi networks, which means that the identity of the hacker remains unknown. The real IP "freeloader" can only be recognized by a person who has legislative power, using which he can gain access to information from the provider). Thus, whether or not to use the guide below: "How to hack WiFi?" - for selfish purposes, lies entirely on the conscience of the user himself.
  3. Basic Wi-Fi Hacking Techniques
  4. It will take little effort to master them and then a malicious smile will no longer leave the face of such a user, because he always (where there is a Wi-Fi) can stay in touch for free and download whatever he wants from the Internet for free.

The easiest way to connect is to detect an unsecured network:

Through the "Control Panel" enter the "Network and Internet" tab; Go to the "Network Connection Center"; Then open the "Network connection" tab;

A list of networks will appear, from which you should select not protected by a password and connect to it.

We select the password for wi-fi manually

Often, the owners of routers put access codes that are easy to remember, for example, consisting of seven or eight identical numbers or symbols, or simply enter "12345678" or "QWERTY", for example,

the most popular wifi passwords in Russia and the world ... Obviously, such passwords can be easily picked even manually, and special applications can cope with them in a matter of minutes.

To decrypt the received code, special applications or services are used.

Next, we will take a closer look at the topic of how to crack a wi-fi password, using various methods and utilities designed for these purposes.

Brute force programs for automatic password guessing

Brute force

  • Is a technology for selecting access codes by a program in automatic mode.
  • Experienced users write such applications themselves. They purposefully hack the target network, mailer, resource, etc. Also, many hackers use ready-made utilities. For example, "Proxy Grabber" automatically displays information about connecting to servers.
  • The attacker receives a file with all the data, which is then applied in the brute-force application. A library with combinations of names and passwords is also built into the application (libraries are distributed on hacker forums and are constantly being updated). The utility automatically changes the proxy, so the web server cannot identify the attack, and therefore the intruder.

Brute force analyzes about one or two hundred streams at a time. The higher this number, the faster wi-fi will be hacked. However, the amount is limited by the power of the PC. On low-power computers, you have to run no more than 100 combination checks at the same time; accordingly, with such values, the procedure can drag on for a long time (sometimes it takes several days).

Most Popular Brutus Apps:

  • Brutus AET;
  • All-in-One Checker;
  • Appnimi Password Unlocker.

Solving the password using the PIN code of the device

To guess the password for a WPA / WPA2 protected Wi-Fi network, you will need: PC with Wi-Fi adapter (almost all laptops and netbooks already have built-in modules);

  1. USB flash drive not less than 2 Gb;
  2. Elcomsoft Wireless Security Auditor utility for Windows.
  3. It is recommended to perform the basic operations in the Linux environment, although it is possible to execute the conceived through the Windows OS, but in Linux everything is much easier. It is necessary to format the USB flash drive and save the "WiFi Slax" package on it.
  4. Weifai-Slax is launched directly from external media, just expand the contents of the "boot" directory and click on "Wifislax Boot Installer". Next, specify the s parameter and click "Enter".
  5. Then start the PC from the created flash drive and perform the following sequential steps:
  6. Specify boot with SMP kernel and wifislax with KDE with corrections;
  7. Wait;
  8. After the download is complete, it is recommended to change the laptop's MAC by running "ifconfig wlan0 down" in the console;
  9. Elcomsoft Wireless Security Auditor utility for Windows.
  10. Now open the "Macchanger" application;
  11. Click "Change MAC";
  12. Exit the utility and execute “ifconfig wlan0 up;
  13. Elcomsoft Wireless Security Auditor utility for Windows.
  14. Open the "minidwep-gtk" utility;
  15. Click "Scan";
  16. If among the points found there are WPS support, then they are the easiest and fastest to hack.
  17. Newbie hackers are advised to hack points with active WPS and only after gaining experience proceed to complex tasks. Highlight the point and click "Reaver";
  18. Click "ok";
  19. The utility will show the password;
  20. If the attack was unsuccessful due to the blocking of WPS, then the package recorded on the USB-carrier contains means for bypassing it;
  21. If no points with WPS are found, then it is very easy to guess the password when at least one PC or mobile gadget is already connected to the network. After waiting for someone (the victim) to connect to Wi-Fi. You should select it and click "Attack";
  22. The wireless module built into the laptop will generate interference and the "victim" will be disconnected from the Wi-Fi;
  23. Of course, the victim will predictably make an attempt to reconnect, and this will result in a "Handshake" of the victim's device with a router with data exchange that is easily intercepted. The captured information is saved as files;
  24. Next, you should write the files to the laptop's memory and restart;
  25. Run Windows in a laptop;
  26. Elcomsoft Wireless Security Auditor utility for Windows.
  27. The copied files have an encrypted Wi-Fi access code. To view it, you need to install the Elcomsoft Wireless Security Auditor utility;

Click import data - TCPDUMP; After that, with one finger, click on "Ctrl" and, without releasing it, click on the button with the English letter "I";

Specify copied files;

Click "Run ...";

Done.

Note:

WPS is an encryption technology vulnerability. The connection is made using a PIN code. For example, a PIN can contain eight characters, that is, after going through about one hundred million PIN-code variants, hacking of the Wi-Fi network will be successfully completed. The disadvantage of this technology is that it is allowed to divide the PIN into a couple of parts. As a result, it is required to analyze parts of a maximum of four characters, and this reduces the number of options by several orders of magnitude (up to 10 thousand).

  1. We use phishing
  2. Many users have come to love the "Phishing" method. The method is based on the manipulations of a cracker, forcing the owner of the Wi-Fi network to give out the name and password himself.
  3. Basically, the "hook" is thrown through an e-mail message or social network, but in the case of Wi-Fi, the "victim" will begin to suspect something is wrong. Therefore, the hacker builds the trick differently, for example, organizes a duplicate network with an identical name (the name of the victim's Wi-Fi and the one created by the cracker are the same). As a result, when an unlucky user connects to a fake Wi-Fi, he specifies a password. The owner of the phony network easily reads the entered access code and turns it off. Then, in the usual mode, it connects to Wi-Fi, because the password is already known to him.
  4. The technique is easy to implement, however, hackers are lazy and made it even easier for themselves to hack by developing a special application "Wifiphisher".
  5. Follow these steps:
  6. Install the Weifisher program on a PC (it is freely available on the Internet);
  7. Disconnect users from Wi-Fi;
  8. Wait until the program switches the victim's router to the access point mode and makes a duplicate of the network with the same name;

Next, the utility will carry out some additional autotuning;

Kak-vzlomat-parol-ot-Wi-Fi-3-800x534.jpgThen the application will display a fake window on the victim's PC or device, which will ask you to update the software;

The victim will specify a password to update the software;

  • Since the owner of the fake menu is a hacker, the password entered by the victim will be displayed on the monitor of his PC;
  • It is done.
  • WiFi password storage applications

Many convenient programs have been created, with extensive databases of logins and passwords for Wi-Fi networks around the world. These utilities collect user-entered Wi-Fi access codes and continually update them. The utilities are simple and come with intuitive menus. Often the user is only required to activate the Wi-Fi search and select an available network.

The most popular are the following programs:

WiFi You;

Click import data - TCPDUMP; Wi-Fi Passwords;

Router Scan.

Not very popular, but no less effective, are the programs "Wi-fi map" and "Swift WiFi". They visually show the user the Wi-Fi points on the map and automatically connect to the nearest point.

We connect to an open WiFi network with filtering by mac-address

Some users have high hopes for ensuring the security of their network by filtering by MAC address, however, in practice, even a novice hacker bypasses such protection faster than the owner of the router enters the device's web configurator with administrator rights. The procedure for changing the MAC of a wireless adapter in Linux takes only a few seconds, for example, with the command "ifconfig wlan0 down". Also, the "Macchanger" utility allows you to automatically assign random MACs, as a result, even a technically advanced network owner will be confused. And if the victim uses a whitelist, the "Airodump-ng" application helps to determine the loyal address. The utility displays the allowed MACs in the "STATION" column.

  1. You can also identify a valid MAC using Brute force, which was already mentioned at the beginning of this article.
  2. The mdk3 application in brute force mode is also capable of picking up the MAC. The main advantage of the utility is the ability to detect the MAC even in the absence of devices connected to the wireless router. For example, you can use the command: mdk3 wlan0 f -t 20: 25: 64: 16: 58: 8C -m 00:12:34.
  3. Protecting your WiFi network from hacking
  4. The more security steps you provide, the longer and more difficult it will be to hack your network, and a newbie hacker may even give up. Therefore, it is recommended to use all the recommendations below, without missing a single one.
  5. Set the password to enter the router's web configurator
  6. In the web interface of the router, open the “System Tools” tab.
  7. Then enter the subsection "Password" and set a secure access code. Be sure to click "Save" upon completion.
  8. Set the access code for the Wi-Fi network.

Enter the “Wireless” tab and then go to the “Wireless Security” subsection. Set the type of encryption "WPA / WPA2" and show your imagination to set a complex password. Save the entered parameters and restart the router.

  1. Hide wi-fi name
  2. Reopen the “Wireless” tab. Uncheck the box "Enable SSID Broadcast".
  3. Click "Save".
  4. Activate MAC filtering
  5. Determine the MAC devices that will be allowed to connect to Wi-Fi (for example, you can see the address of the smartphone in the "About phone" settings section). Then open the subsection “Wireless MAC Filtering” in the “Wireless” tab.
  6. Click on "Enable" and activate the "Allow the stations specified by any enabled entries in the list to access" box.
  7. Then click "Add New ...".

Specify MAC with enabled status.

Click "Save".

Turn off QSS (WPS).

Open the “WPS” tab (in some interfaces of router models it is called “QSS”). Click "Disable WPS".

Restart the router.

How to hack Wi-Fi from a phone?

The easiest way is to install the free Kali Linux application from the application store on your smartphone or tablet and launch it.

The use of the program does not cause problems, since most of the processes in it are automated. If it is impossible to install the above utility, it is recommended to find and install "Linux Deploy" in the market, the menu of which is also not complicated.

While these tools are easy to install, they are advanced cracking tools that even a novice hacker can grasp. Advanced users often use WiFinspect for hacking. It allows you to display detailed information about the modes of operation of the detected networks. The program is also freely distributed, but some of its functions require root to work.

If you have Root authority, you can also use the powerful Wifi Analyzer tool. He successfully copes not only with Wi-Fi networks at a frequency of 2.4 GHz, but also 5 GHz.

Owners of Apple phones can successfully hack a neighbor's Wi-Fi by installing Airslax or Aircrack-ng.

Why is it dangerous to use neighbor's wifi?

Some open neighbor networks that are not encrypted and do not have eavesdropping protection are dangerous to use.

Since every attacker who connects to such a Wi-Fi is able to intercept and scan the traffic of any clients.

If the network is encrypted and protected, then the danger is reduced, but such a wi-fi will have to be hacked in order to use it, and this is punishable under Articles 272 and 273 of the Criminal Code of the Russian Federation.

Obviously, in order to punish a hacker, you need to find him, for example, by revealing his IP. It should be noted that for this, the victim will need to make an appropriate request to the provider company. Communications companies that provide communications services for Internet access can only release information to VIB employees or people from government agencies with even more power. It is not possible for ordinary people to obtain data directly.

Punishment for hacking networks Hacking wifi: Programs and Apps Many utilities have been developed for hacking Wi-Fi networks. Some of them may seem too simple to use, but that doesn't diminish their effectiveness. Applications are released for all existing platforms, below we will consider the most popular of them.

  • Under Windows
  • For the most popular platform in the world, the largest number of cracking apps released.
  • Wificrack
  • - Works almost completely automatically. The selection technique is used.
  • Elcomsoft Wireless Security Auditor utility for Windows.
  • Steps:

Run "WifiCrack.exe";  — Many utilities have been developed for hacking Wi-Fi networks. Some of them may seem too simple to use, but that doesn't diminish their effectiveness. Applications are released for all existing platforms, below we will consider the most popular of them.

  • Mark the network;
  • Click "Next";
  • Elcomsoft Wireless Security Auditor utility for Windows.
  • Activate the database with passwords and click "Start";
  • Now the application directory contains the file "Good.txt", which displays the password and login.
  • Kali Linux
  • Install Kali Linux in a Vmware virtual machine;
  • Run the program and select "Live";
  • Enter "iwconfig";
  • Record the displayed name of the interface on a sheet of paper;
  • Run "airmon-ng start wlan0";
  • Elcomsoft Wireless Security Auditor utility for Windows.
  • Then "airodump-ng mon0";

Click "ctrl + c";

Enter "wash -i mon0 -C";

Specify wifi with WPS;  — Many utilities have been developed for hacking Wi-Fi networks. Some of them may seem too simple to use, but that doesn't diminish their effectiveness. Applications are released for all existing platforms, below we will consider the most popular of them.

  • Enter "reaver -i mon0 -b (the name that was written earlier on a piece of paper) -a -vv";
  • The login and code will appear on the monitor.
  • For Android

Sometimes it is not very convenient to use a laptop for hacking. The use of a compact android gadget is much less noticeable.  — Many utilities have been developed for hacking Wi-Fi networks. Some of them may seem too simple to use, but that doesn't diminish their effectiveness. Applications are released for all existing platforms, below we will consider the most popular of them.

  1. WPS Connect
  2. After installing, run the program and tap on the icon circled in red in the screenshot below;
  3. Tap the victim's network;
  4. Tap "Show password", the access code will be displayed.

Kak-vzlomat-parol-ot-Wi-Fi-5.jpgWIFI WPS WPA TESTER Tap "Update"; Many utilities have been developed for hacking Wi-Fi networks. Some of them may seem too simple to use, but that doesn't diminish their effectiveness. Applications are released for all existing platforms, below we will consider the most popular of them.

  1. WPS Connect
  2. A list of networks will be displayed (next to which there is a green lock, you can hack);
  3. Elcomsoft Wireless Security Auditor utility for Windows.
  4. Connect with the selected Wi-Fi;
  5. The access code appears on the display.
  6. WifiKill
  7. - If there are too many devices connected to Wi-Fi and the connection limit has been exhausted, then this application will help free up the vacant space.

Click "Grant";

A list of clients connected to Wi-Fi will appear;

Select the client and tap "grab";

Then click "kill";

Now you can safely work online.

  • For iPhone
  • Apple device owners often use Aircrack-ng, which intercepts information and quickly breaks codes.
  • IPhone owners often use "iWep Lite", which you just need to turn on and then specify the Wi-Fi to crack. The utility will analyze automatically and show the access code.

Related materials

Sources used:

https://wifigid.ru/vzlom/kak-vzlomat-wi-fi

https://bezwifi.ru/router/kak-vzlomat-parol-ot-wi-fi

https://windwix.ru/kak-vzlomat-wifi/

There are times when your own Wi-Fi stops working. Or there is a need to connect on the street, with a smartphone in hand. I would like to know the password from my neighbor's Wi-Fi, finish my business on the network, and never go back to someone else's router.

Ways to find out someone else's Wi-Fi password

There are several ways to get to a third-party access point. The speed of "extraction" of the password depends on the cunning of the owner, the power of the available devices and the amount of free time.

Password guessing method

The simplest, most affordable and effective trick is to go over the obvious combinations. People do not remember codes well, resorting to familiar numerical variations: 12345678, 1111, 1234.4321, and so on. Add "qwerty123", "ytrewq321" and "qazwsx123" to this list.

Change mac address

Have you noticed that some Wi-fi hotspots in the city are not protected? It will not be possible to connect to it, because it filters users by mac-address.

For the uninitiated, a mac-address is an identifier, a kind of key that is assigned to devices connected to the Ethernet network.

To get to the key, you have to use special scanners. They analyze Wi-Fi points in the area and disclose their addresses.

Traffic interception

The hardest way to get to someone else's password. With the help of third-party applications, a huge amount of data is intercepted that the router exchanges with the device of the network user. The information received can be decrypted, and the password can be obtained from it.

Some routers have that very useless button - WPS, which allows you to connect devices in a simplified mode. By default, many routers still have WPS enabled. And the connection to such a network is carried out just by entering this PIN-code, which consists only of numbers.

There are a lot of complications. It is necessary that the network be used to the fullest. We have to deal with a complex, confusing interface. If you want to test your strengths, opportunities - download the program "Commview forWiFi". It picks up the packets being distributed and displays them as nodes, channels, signal types, a network of connections, and available wireless access points. In professional circles, it is most often used to find and eliminate dangerous viruses that transmit encrypted data to the cloud.

Hacking via pin router access point

This method was opened in 2011. The user gets to the network by breaking the WPS protocol. This system turns on encryption and prescribes the security key automatically, without user intervention. Simplification for the layman.

Experienced hackers quickly found a serious technology vulnerability that could open up a neighbor's connection in a matter of hours. Hacking is done using OCLinux and requires an understanding of programming fundamentals, a wireless network adapter to intercept the data, and a few hours of free time.

If the router software supports this function, then WPS can and should be disabled.

Manual selection

Phishing will help if you know your neighbors' email address, and also understand what degree of computer literacy they have. The bottom line is to send a letter to their mailbox with the requirement to send a Wi-Fi password and other useful information in response.

This is a method for fraudsters to get to bank card numbers, or take away virtual valuables in dishonest ways.

There are no detailed instructions on how to use phishing. Proceed at your own discretion. There are a lot of options: scare with a caught virus, blackmail by turning off the Internet, or come up gently - offer to speed up data transfer, improve network stability and, in a pre-created form, offer to enter a login and password to the router.

  • Hacking software
  • There are hundreds of applications for extracting other people's information. Some take advantage of the built-in security vulnerability, others brute force passwords, others look for a mac address, or exist as dictionaries where the Internet community enters the current passwords of surrounding access points.
  • Brute force - from English, "brute force", the above method of obtaining data using brute force. If the victim does not use standard combinations, he has to install auxiliary software and understand its interface.

Automatic selection of combinations

Some programs literally manually, in several threads, pick up a password for a new network character by character. Because of this, work with such programs can last from several days to months, depending on the length of the required code. The most popular of them:

John the Ripper;

Aircrack-ng;

  1. RainbowCrack.
  2. They allow you to specify the duration of the password, as well as resort to several brute-force mechanisms, which significantly reduces the search speed and also reduces the load on the system.
  3. Wifi crack
  4. Wifi crack is not an ultimate solution for cracking passwords, but a handy utility for everyone who is not familiar with a confusing programming language. Works on modern operating systems, is constantly updated.
  5. The program is very simple to use:

Download files. This is often a zip archive containing drivers and a dictionary of the most popular combinations. Also very often includes text instructions with screenshots;

Unzip the file, run WiCrack.exe and copy the command signed in the manual as "password guessing" into the command line that appears;

  1. Start the process. The password variants will remain in a separate file with the .cap extension in the root of the program folder. Kak-vzlomat-parol-ot-Wi-Fi-.jpg
  2. Go to the "Import" tab of the program itself and insert a file with the extension.
  3. Click "Start". If the data is successful, the password will appear in the main window.
  4. Change mac address
  5. The essence of this method was described above. You need to get to the mac-address so that the Internet on the device works through someone else's router. Found an ID? Now change it on your device. On a computer, this is done like this:
  6. Go to the "Control Panel".
  7. Go to the "Network and Internet" section, select "Network and Sharing Center".

Find the category: "Change adapter settings".

Call the context menu on the desired access point with the right mouse button, select "Properties".

Network tab, then Configure, after Advanced.

Mark "Network address" and enter the coveted 12-digit number.

Experienced hackers quickly found a serious technology vulnerability that could open up a neighbor's connection in a matter of hours. Hacking is done using OCLinux and requires an understanding of programming fundamentals, a wireless network adapter to intercept the data, and a few hours of free time.

Click "OK" to restart the network connection.

  • On smartphones, changing the mac address is much more difficult. On Android, you need to get root-rights and fight with third-party applications. Do it at your own peril and risk. Mac address scanner
  • Mac address scanner reveals the data of surrounding mac addresses. It does not require any special knowledge and does not have a complex interface. In this case, the creator of the utility is not important. There is a version from ColarSoft. You need to install it, run it and press the green "Start" button to analyze the surrounding networks. The received data is saved in the computer memory, or sent to the Internet storage. The second column displays the current mac addresses. If the owner of the access point does not use such protection, the identifier will be displayed as several Xs. Otherwise, you will get a 12-digit combination.
  • The essence of hacking platforms is described above, but here is a list of relevant and powerful programs in use around the world. AIRCRACK
  • ... It is capable of absolutely everything, but it is a command line where you need to enter commands. The friendly interface was not delivered; AIRSNORT
  • ... Intercepts data packets, guessing keys using cunning algorithms. It was updated several years ago, but has not lost its relevance; KISMET
  • ... More protection against third-party intrusion, but, if desired, allows protocol packets of third-party routers, and even finds hidden networks; FERN WI-FI WIRELESS CRACKER

... Aims at the security of the system. It searches passwords using a dictionary, and in the case of WEP protection of the router, it connects algorithms to display the real password. Constantly updated with additional functions;

AIRJACK

... Functionally similar to AIRCRACK, but can also create a false access point, which helps protect the main one from unwanted hacking, or make sure that the victim, without suspecting a substitution, enters the password on his own into a nonexistent router;

WIFIPHISHER

... A unique software, in fact, a virus that connects to someone else's system and displays a message in the browser, requiring you to enter a password from WiFi, supposedly to install important updates. The user listens and no longer notices any changes. The attacker gets what he wants.

Commview for capturing data packets

I would like to talk a little more about this toolkit. The app is constantly updated with valuable mechanics and categories. Mainly used by network programmers and wireless network administrators.

  1. The program splits data packets into protocols, shows the signal strength, its speed and other useful parameters.
  2. To borrow the nearest Internet, you need to download the application and scan the desired WiFi from the list of networks. The program will display the entire packet of transmitted data. Commview allows you to use the "node reassociation" function. Users will disconnect from the connection automatically, and instantly connect back, and the program will open the EAPOL protocols. They contain the necessary information - the desired passwords for hacking the Wi-Fi network.
  3. AirCrack-NG will help to decode the received protocols.
  4. Using Aircrack ng
  5. This is a complex toolkit that requires preliminary preparation and many additional steps. Pressing "start" and waiting for a positive result is not worth it. Having previously received all possible data through the Commview, you need to:
  6. Download and run Aircrack ng, go to the first tab.
  7. Enter the path to the file with intercepted packets in the "Filenames" line.
  8. In the "Encryption" category, specify "WPA".

There is a dictionary, or a database of popular passwords, you need to insert it into the Worldlist line.

Check the "Advanced option" checkbox.

In "Specify ESSID" write the name of the desired network.

  • In the window that appears, enter the MAC address of the network, which can be obtained using the Mac address Scanner.
  • Launch. The analysis of the available data will take from 5 hours to several days.
  • How to hack Wi-Fi from a phone
  • It is more difficult to get to the neighbor's password from the phone. On the iPhone, the process requires an incredible level of knowledge due to the closed system and artificial restrictions. And on Android - getting root rights, which is a threat in itself. After - installation of the appropriate software. These are the same dictionaries, brute-forcing, identifier hunters, and so on. There are a lot of applications. They require the same steps as the computer versions. Sometimes requiring more time to process information. Here are the most popular utilities. Verified, high quality, no viruses.
  • Android apps

WPS Connect;

Specify wifi with WPS;

WIFI WPS WPA TESTER;

  1. WifiKill;
  2. Network Spoofer;
  3. WiFi You.
  4. The most reliable, convenient and simplest of them is WPS Connect.

It only works with networks protected by WPS technology and is managed as follows:

On the main screen, update the list of access points;

After loading, select the point with the highest signal quality;

Pick up passwords from the available database;

If you have root rights, several options will appear on the screen that will allow you to connect to the selected router.

Video of hacking Wi-Fi on Android using Wps connect

Consequences of using someone else's Wi-Fi

Nobody will jail you for "good" use of someone else's Wi-Fi network. But if, after your intervention, a person's credit card information has disappeared, his email password has changed - worry. Experts can easily identify anyone who tampered with files, who stole Internet protocols and other useful data. You can be "shaken", and even taken away from your computer, but if this is not your doing, everything will cost you inconvenience for several days, paying for self-indulgence.

Many of them can be bypassed using the hack-captive-portals program, for details see the article "A quick, easy and working way to bypass the Captive Portal (hotspot with authorization on the web interface)". For very advanced users, see the article "Bypassing a Captive Portal Using OpenVPN". Wireless adapters for hacking Wi-Fi A good starter option is the Alfa AWUS036NHA with the Alfa ARS-N19 antenna. This is generally a very good Wi-Fi adapter for hacking wireless networks, including attacks on WPS. The disadvantage of this card is that it is rather old and does not support modern protocols.

To support modern protocols, you can choose an Alfa with external antennas from this list.

WiFiGid.

ru and personally the author of the article Botan does not call for hacking

WiFi! Especially other people's networks !!! This article was written for educational purposes to improve personal information security. Let's live in peace!

Below are both general methods of hacking wireless networks, and instructions or links to them are given. In addition, recommendations are provided to improve the protection of your own home network from possible evil neighbors and other intruders. I hope this article will be useful to all readers. For others, I recommend that you familiarize yourself with the proposed material in more detail and leave your comments.

  1. Content
  2. Hacking methods
  3. Wireless networks combine many technologies. And where there are many technologies, there are also many security technologies. And at the bottom of this "duck in the egg" holes in the security system emerge. And every possible hole has its own method of attack. In this section, I would like to show all possible ways how to hack Wi-Fi and penetrate a wireless network. But which of these options will work depends entirely on the specific situation. In addition, it may happen that the network is completely protected and cannot be hacked at the current time)
  4. Freebie! About how much desire causes a freebie in all people. Everyone wants someone else's internet. But it's one thing to quickly grab a password and brag to classmates or save money on the Internet in a hostel, another thing is to understand the technology itself, which will allow you to access almost any network. Do not run after bragging, only study and understanding of the processes will make you an expert in this area. My task now is to show the scope of possibilities and the creative beauty in this.
  5. The main ways to hack someone else's Wi-Fi:
  6. Unsecured networks.
  7. Manual password selection.
  8. Brute force the password.
  9. Selection of the WPS code.

Phishing.

Database of passwords.

It may turn out that your neighbor is a talented programmer. And if he notices that an outsider has hacked into the protection of his router, he will hasten to block the air and spoil the mood with the methods known to him.

Bypassing filters.

Interception of the "handshake" and its decoding.

In my case, this command looks like this:

Hacking a router and pulling out an open password.

We will briefly try to look at all these methods. I will not go into details much, but if you suddenly have a question - ask it in the comments. Is it possible to hack?

Unsecured networks

Usually nowadays all networks are encrypted and protected with a key. Something like the following picture:

But there are still access points that are not protected in any way. And you can connect to them completely freely - without a password. An example of such a point is public places, the subway.

Recommendation!Recommendation!

Always protect your home network with a password.

Manual selection

These first two methods are written simply to show that sometimes it is not worth resorting to complex technical actions, because usually everything is in sight, you just have to think a little.

The average user usually sets himself a simple password - try to imagine what he could have entered and guess it. It works great to find out the Wi-Fi password from friends and neighbors. What if you already know some password of your neighbor? People are very fond of repeating themselves, and they usually enter the same thing. Works rarely, but aptly. Especially on old WEP networks, where passwords of less than 8 characters were allowed - there were often both "12345" and "QWERTY".

TOP 25 most common Wi-Fi passwords

Many providers (Rostelecom, ByFly, Yota and others) sometimes use “default” passwords on their models. Look for them on the Internet or on our website, if you are lucky)

  • Brute force
  • Brute Force is a method of automatically brute-force passwords. After all, you enter the password freely? And what to do if you force the program to go through all possible options on its own and try to connect with them.
  • There are pluses - old models break with a bang without detection of an attack and a weak password (WEP). There are downsides - new models can detect you (you have to be masked) and introduce delays in brute force, or even a complete ban of the attacking machine. Another disadvantage is that modern routers force users to enter complex long passwords, which will take years to brute-force. So you have to look for other methods.
  • But still try to sort out the network for light passwords, or if it is WEP, and not WPA / WPA2, it is definitely worth it. The probability of a hole is always there.

Highlights on Brutus:

Programs can use the entire enumeration of options - suitable for a WEP network, or for a router model that forces you to force complex passwords where a dictionary attack is impossible.

There is a variant of a dictionary attack - when a file with the most common passwords is loaded. There are a lot of these files - in one Kali Linux there are a couple of dozen of them, and how many are on the network. For me, it is enough to check for basic passwords with a small list - after all, hacking through brute force is no longer an option, but for a basic check and saving time, the simplest list is enough.

  1. The program works in several threads - i.e. can simultaneously try to iterate over many options at once. But there is a peculiarity here: the router itself can discard such attempts, introduce authorization delays, or completely reboot. Those. streams need to be played carefully. In any situation, check everything on your hardware, so you will find out for sure.
  2. Some people write about proxies ... But what kind of proxy is there))) We connect over the air) The point is that some programs successfully mask their requests for different devices, which makes it possible to work in a multi-thread.
  3. I will give a selection of programs at the end - usually one program like Aircrack (market leader) can do all the actions by itself. No need to reinvent the wheel or install 100,500 programs. In the meantime, I want to continue the discussion with the hacking method.

Interception of the "handshake"

One of the most working methods is to intercept the handshake. What it is? Also a kind of pure brutus, only with a preliminary interception of the cipher and its further attempt to decrypt it. Here's a quick outline:

You sit quietly on the net.

The network is breaking.

Your computer reconnects again.

What happens at the moment of reconnection: your computer re-sends the password to the router, the router accepts it and, if entered successfully, establishes a connection. In practice, this is absolutely imperceptible - neither disconnecting the network, nor entering a password - everything is done automatically by your own system.

This process of sending a password can be called a "handshake" or "handshake". But this method has a drawback - the data is transmitted initially in encrypted form. But with a strong desire, this cipher can still be disassembled into parts (there are even services) and open the password-protected data. And it will take no more time than direct brute-force. This is the whole basis of the method. Aircrack, already familiar to us, can shoot handshake, and HashCat (a brute-force and password generator) can brute-force a password. But you better watch the video above. This is the same way when they calmly break the neighbor's wifi. WPS code

Some routers have that very useless button - WPS, which allows you to connect devices in a simplified mode. By default, many routers still have WPS enabled. And the connection to such a network is carried out just by entering this PIN-code, which consists only of numbers.

The PIN code has only 8 digits. Above, I already talked about the admissibility of a full brute-force WEP brute-force, but here it is even simpler - only numbers. In addition, a correlation was found that allows the methods to make a selection in pairs - first 4 digits, and then 4 digits. All this greatly speeds up the search, and a point with an open WPS can be broken in a few hours.

  1. Another attack option is to use default codes. YES! Some devices come from the factory with the same PIN-code turned on) And the proposed programs already know these passwords, so everything can be much easier.
  2. Recommendation:
  3. disable WPS in your router! It's mostly useless.

Phishing Another interesting method is to display your page from a web user ... Yes, this can be done without being connected to the network. But the substitution can be noticed. The most valid option: .

An access point with the same name of the compromised network is created.

A good signal and name will force the victim to connect to it sooner or later.

After logging in, the password is entered, which successfully comes to you.

In my case, this command looks like this:

The method is working, but here you cannot do without luck. There are also available software implementation methods, for example, using

In my case, this command looks like this:

Wifiphisher

  • Let's take a closer look at this application, because the attack vector is interesting. We need Kali Linux (yes, guys, all the cool free hacking software of any level is there, so put it on). In the terminal, run:

In my case, this command looks like this:

wifiphisher

In my case, this command looks like this:

Immediately after launch, the program starts looking for the nearest networks (all programs with a network hack do this):

Pay attention to the number of networks. Find the one you need in this list and enter its number. Next, various attack scenarios will be proposed: All options are approximately similar, the only difference is that a user of a foreign network will have an authorization or software update. I recommend paying attention to the following points:

Firmware Upgrade Page - you will be prompted to update the firmware of the router itself. It looks interesting and believable, but you just need to enter the same key:

In the meantime, the password arrives in the console like this:

That's all. The approximate use of all programs comes down to this. I will not dwell on one in detail, otherwise the whole book will turn out. I designate attack vectors, give hints - and you already independently study each direction. At the end of the article, I will give an interesting bonus from professional hackers for those who want to go deeper.

Limit access to PIN information, do not enter it on dubious sites.

This process of sending a password can be called a "handshake" or "handshake". But this method has a drawback - the data is transmitted initially in encrypted form. But with a strong desire, this cipher can still be disassembled into parts (there are even services) and open the password-protected data. And it will take no more time than direct brute-force. This is the whole basis of the method. Aircrack, already familiar to us, can shoot handshake, and HashCat (a brute-force and password generator) can brute-force a password. But you better watch the video above. This is the same way when they calmly break the neighbor's wifi. Recommendation:

Be wary if the network to which the device was previously automatically connected without problems asked for a password - especially on third-party pages (software update, password on VKontakte, etc. - this does not happen). Pay attention to duplicate networks at home.

Password databases

There are programs and services that store databases of passwords for public access points. This is especially true for all kinds of cafes in large cities. Do you want to break the cafe? But why, usually someone has already connected to it, which means there is a possibility that the password has floated to the databases.

An example of such a service application is Wi-Fi Map or Router Scan. And the map will show, and the available points, and will connect itself.

make a selection of the service and, in case of suspicion of hacking, check yourself in these databases. It's even easier - change your Wi-Fi password every six months.

Hacking a router

  • Sometimes you have the opportunity to connect via a wire to Wi-Fi, or you know the external IP address from the Internet and can access the router (sometimes it is possible to determine it with a high degree of probability by scanning).
  • Then you can try to guess the password to enter his control panel. Many people leave it by default admin / admin (username / password). And already in the settings, the Wi-Fi password is stored in clear text.

Bypass filters

Some access points will not let you in, simply because you have the wrong ... MAC address. Sometimes it happens. This is no longer about hacking, but sometimes the whole task of hacking boils down to changing the MAC - for example, when you previously successfully connected, but now it does not let you into any one, tk. the administrator or parents banned your device precisely by MAC. The solution is simple - change it.

  1. Sometimes they use:
  2. Black list. Then you just need to change the address to one that is not in this list. Universal program - Macchanger.
  3. White list. Only the devices specified in it are connected. Then you first need to look at these devices and their addresses (Airodump-ng will do), and only after that, adjust for them with the same macchanger.
  4. Network protection

I will highlight some of the problems that you should pay attention to so that no one can connect to your network:

Set a strong password on Wi-Fi.

Put a complex password on the router panel itself.

  • In case of paranoia - enable filtering of MAC addresses, allow only for your devices.
  • Turn off WPS (sometimes called QSS).

Hacking from your phone

All the methods above were mostly about using a PC. Kali Linux is still the optimal environment for hacking - everything is already provided there. The last option is Windows. Phones are much more complicated. While preparing the article, I read "neighboring publications" with recommendations to stick Kali on Apple, or launch free Aircrack-ng on them directly in Android or iOS, and a bonus with a sprinkle of strange keywords - in short, this does not happen in life. If you want to break it - put Kali, if you only have a phone - there will be no cool solution.

Basically, all the recommendations from the network in this field are outright nonsense. My recommendation is to enter something like "wi-fi hacking" into Google Play or the App store, and you will get a whole collection of programs. And there already look at the reviews and do not put any fake rubbish. The main categories of software are here:

  • Security options for your own access point
  • Come up with a long, complex password with upper and lower case letters, a random sequence of numbers. Even with the entire packet of intercepted data on hand, a hacker will be tortured to kill electricity and PC power to select a combination. Coming up with a new username and password for the router software will help, since usually no one changes the standard admin / admin duo.
  • Don't rely on mac-adress. Such protection is the easiest to crack.

Responsibility

Many people write about responsibility under a number of articles of the Criminal Code of the Russian Federation: 272, 273, 274. Even at the university they studied this issue and somehow then it all looked suspicious. Here are the titles of the articles:

272 - Illegal access to computer information

273 - Creation, use and distribution of malicious computer programs

274 - Violation of the rules for the operation of storage, processing or transmission of computer information and information and telecommunication networks

  1. In fact, only 272 remain here. But let's take a closer look at it:
  2. Unlawful access to legally protected computer information, if this act entailed the destruction, blocking, modification or copying of computer information.
  3. Please note that the very use of the Internet, if it did not cause any damage, to put it mildly, is difficult to fit here. It's another matter if traffic or time is charged, and you use it ... But nowadays there is no limit on Wi-Fi. Whatever it was, I still categorically do not approve of any villainy in my inner circle - after all, we are all brothers, who if not we.

Video of hacking a neighbor's Wi-Fi password in 5 minutes

Programs

There are really few powerful hacking programs for all occasions. I recommend paying attention to the following:

Windows - WiFi Crack

Kali Linux - Aircrack and company. This is the best Wi-Fi hacker, most of the manuals from YouTube are about it, including the video from this article, support absolutely all methods of hacking, you can safely write a separate article. It is ideal to work from a laptop, but you can also work from a computer using Wi-Fi adapters.

Kak-vzlomat-parol-ot-Wi-Fi-14.jpgKak-vzlomat-parol-ot-Wi-Fi-6-800x533.jpgh-wifi6.jpgh-wifi11.jpgfind out your neighbor's wifi

(

3

Is it possible to hack? - Yes, it is possible. Is it possible to protect yourself completely? - No you can not. Because the technology is initially open for user connection.

272 Illegal access to computer information

273 Creation, use and distribution of malicious computer programs

274 Violation of the rules of operation of means of storage, processing or transmission of computer information and information and telecommunication networks

Related books and videos

estimates, average:

2.33

1 Star

out of 5)

Loading...

2 Stars

In today's article, let's touch on a delicate topic: how to hack a Wi-Fi network. Someone will ask, is it legal? Of course not, this is considered a serious offense, so if someone decides to do it, they do it at their own peril and risk. Of course, this can happen for everyone when the money in the account runs out and the Internet is turned off for you. And at that very moment, force majeure circumstances appeared, when Internet access was urgently needed. So what else is there to do? That's right, use the neighboring Wi Fi Internet. Option one, ask him for the password from the WiFi network, option two, hack his WiFi network. And we will tell you how to do this below in the article.

Network without encryption

Of course, there are not greedy people who do not set a password on a WiFi network. Or the user, when setting up the router, forgot to install it. In such cases, it will not be difficult to connect to this network. It is enough just to scan the radio broadcast on your device, finding a network that is not protected, click on it and connect. In such cases, the question of how to hack the WiFi network disappears by itself.

We select the Wi Fi network password manually We are looking for WiFi with the highest signal strength. Preference is given to the neighbor's network or the network that you know the owner. Later, you will understand why this is so. Very often, inexperienced users set a password without thinking about the complexity of the password typed. And all their fantasy ends at the date of birth, the name of the pet, the surname. Knowing the neighbor (owner) of Wi-Fi, it will not be difficult for you to find the key. If it did not work out with the selection of the personal information of the neighbor, we proceed to the next option, which is very popular among users. These are the most common passwords, we will list them in the table below. , One of the advantages of this method is its simplicity, but there are also disadvantages, one of which is the time that needs to be spent on this method. Especially if a neighbor has set restrictions on entering a password and login in the router settings, then after 3 unsuccessful attempts, the next attempts can be made only the next day. .

3 Stars

Hacking by changing the MAC address

Some craftsmen prefer to set filtering by MAC address (MAC address is a unique identifier that each device has) instead of a password. When scanning, you will see a network to which supposedly you can connect without problems, but when you try, you will fail. So there is filtering that you need to bypass. You need to find out which MAC addresses are allowed to connect. Here programs that can scan will come to your aid, for example, Airodump-NG MAC Address Scanner Having learned the MAC addresses, you can start replacing your MAC address on your computer. We go to " Start "," Control Panel

4 stars

"Find" Network and Sharing Center "On the top left side, look for the line" Changing the network adapter settings ". We select an active network connection, click on it with the right mouse button and click on the line “ Properties

5 stars

". In the window that popped up, we find the tab " Network "And click on the button"

Tune

". We activate the network address and enter a new MAC.

There is a very convenient utility to replace MAC Address on Windows 10

Technitium MAC Address Changer

  • with the help of which you will quickly do it. Then it is recommended to restart the PC. Done, so we figured out how you can hack Wi Fi thanks to the MAC address substitution. Hacking WiFi password using programs There are many hacking programs in this segment, but we will talk about the most popular ones. Aircrack-ng cracker .
  • The Aircrack-ng utility has good reviews from users. It is a large set of tools that includes: airodump, aireplay, aircrack, airdecap. Download and unpack. We go into the folder " Bin »Run the file Aircrack-ng GUI
  • In the tab “ Filenames "You need to select a dump that will capture packets and keys. For example, you can take the utility CommView for WiFi for these purposes. We assign the type of encryption with which the Wi-Fi network is protected: either WEP
  • or WPA For the WEP option, you must assign a key length and cancel in the "

USE PTW attack

". For the WPA option, it is enough just to determine the dictionary for password guessing.

The last action to be done is to click on the "

Launch

  1. ". The whole enumeration process takes 2-5 minutes.
  2. Brute force method
  3. The essence of brute force is a complete automated selection of all possible password options. This method is suitable for advanced users, it will be extremely difficult for an ordinary user. Such hacker methods are often used to hack payment systems, online banks, and accounts.

If you decide to try Brute force, keep in mind that PC characteristics play a big role, if the computer is weak, the program can analyze for several days. At the moment, there are several options for "brute force": Personal hacking. This is when a mail, account, website is hacked. , Brutus check. There is a big hunt here, 1-2 passwords are unnecessary to anyone, a large number of passwords from some large resources are of interest. .

Hacking a computer device made remotely.

  1. Applications work well with Brute force: Brutus AET
  2. All-in-One Checker Appnimi Password Unlocker
  3. Hackers for Windows - AirSlax, Wi-FI Sidejacking, CommView for WiFi, Dumpper AirSlax
  4. - a utility that catches packets on the Wi-Fi network, in the future they are needed to guess the password. Picks up a password with WPA, WPA2, WEP encryption, as well as a WPS pin code. Wi-FI Sidejacking

- this cracker is completely free, few settings, the utility is presented in Russian, we support mobile devices.

CommView for WiFi

  1. - suitable for any Windows OS, the utility captures and analyzes network packets. Russian language is present.
  2. Dumpper
  3. - this utility on the router we crack its PIN code. We launch the scanner. In a minute, you will know about all computers at a distance of a couple of meters. This PIN will be required for some utilities to help you crack your WiFi password.

Cracking the password through the Pin code of the equipment

  • To find out the password through the Pin code of a device with WPA encryption, WPA2, you will need: A laptop or computer, if you have a computer, then you need to have a Wi-Fi adapter on it. USB flash drive with at least 2 GB Elcomsoft Wireless Security Auditor program. We recommend working in Linux OS, as all procedures are much easier to perform. If this is not possible, everything will work out in Windows. We format the USB flash drive and download the utility “ »
  • WiFi Slax
  • ". We launch the program on a flash drive by clicking on " Wifislax Boot Installer ". We indicate the parameter S and click " Input We reboot and start from our flash drive.
  • Choose to start from kernel SMP Control Panel
  • , and wifislax c KDE , waiting for the download. We replace the MAC of the laptop by doing in the console “ Control Panel
  • ifconfig wlan0 down SMP Control Panel
  • We open " Macchanger , waiting for the download. ", Click" Change MAC
  • We exit the utility and in the console execute “ We launch " minidwep-gtk

Scan »And expect. WPS technology is much easier to hack, so we recommend it for beginners. .

Screenshot, select wi-fi network

After scanning, select the victim and click "

Reaver

". Everyone, expect a hacked Wi Fi password There is an easier way to get to know Pin, just take a walk to visit your neighbor. When he leaves, take the router and turn it over, there you will see

WPS Pin A utility with a million wi-fi passwords

There is another method to hack someone else's wi-fi, for this you just need to download the utility, thanks to which, you do not need to hack anything, you just need to find the nearest point with the Internet. Wi-fi map

- Suitable for any gadget. The idea of ​​the application is to exchange Wi-Fi passwords around the world. The utility will issue passwords to the nearest internet wi fi networks on your gadget, but only if someone previously connected here and entered a password, login in the Wi-fi map.

WiFi You - This application already has about 20 million access points around the world.

Swift WiFi - A similar utility to the Wi-fi map, the principle is the same. Install the application, and your gadget will automatically connect to the nearest wireless network that is in the program's database.

  1. Hacking the password from your smartphone
  2. WPS Connect - the main purpose of this program is to determine how vulnerable a router that uses the set Pin code by default is to hacking wi-fi. To use this utility, the device must be rooted. WIBR +
  3. - great for Android phones. The program can simultaneously perform several actions to guess a password for two networks at once.
  4. Download and install. Click on the item " Add Network

»And add the network with the best signal.

We place the checkboxes in the settings that are needed. Click on

Add to Queue

... Done, the utility will start its work. There is a small drawback to this application, after generating each key, it needs to reconnect to the network. WiHack mobile

  1. - this application is suitable for both Windows and Android. To crack the wi-fi password, she uses two options that the user can choose: brute force (simple brute force) or the packet analysis option is much more efficient. It is better to install the full version.
  2. Hacker utility for iPhone
  3. There is a utility for the iPhone called

Aircrack

, it works by interception. There will be no difficulties in working with it, simple and automated. Download, install and run. .

We scan, select from the list the network that you will hack.

  • We expect a little, it's done. Wi-Fi fishing (phishing) , This method of deception for the sake of obtaining a password is rarely used. The bottom line is to visit a phishing page (double page), the user, having entered this page, has his password and login. It is so easy for an attacker to recognize your data. To obtain secret information about a Wi-Fi network, hackers often resort to using a utility. .
  • WiFiPhisher Using WiFiPhisher is simple, you need to: и Making the setting HTTP
  • HTTPS Scanning wlan0 wlan1 .
  • until it connects.
  • Tracking
  • DHCP

and output

  1. IP address
  2. Choosing a Wi-Fi point.
  3. We make a copy of the access point, write a similar name for the network. The real access point will work worse, because of this, the user will connect to your clone.
  4. The browser will ask the user to enter login, password. Thus, the secret data falls into the hands of the cracker.
  5. Steps to take to protect your WiFi network
  6. Set passwords with a complex combination of letters and numbers, the number of characters should be 8-12.
  7. You need to turn off WPS, because this function saves authorized users and, when asked again, it automatically reconnects them. Sometimes it is necessary to change the PIN on the router and peel off the factory label where the PIN is registered. Control Panel
  8. Do not enter your PIN on unverified sites.

- "brute force" application. For its operation, additional database downloads are required. Then it automatically picks up the correct password. Suitable for Android.

When setting up the router, do not use the old types of WEP and TKIP encryption, use the newer types of WEP2 or other more advanced ones.

Limit the maximum number of connected devices. For example, you have a laptop and a tablet in your house, so limit it to 2 devices. After that, more than two will not connect.

Hide your web. Check the box “

Hide SSID

Remember to periodically update the firmware on your router.

There are two articles of the Criminal Code of the Russian Federation that can be applied to illegal access to the network. These are articles 272 and 273. Anyone interested can read them on the Internet. The incident in article 272 is that it is very difficult to prove that it was you who hacked the access. But if during the hacking you used a malicious program (virus), then article 273 of the Criminal Code of the Russian Federation can also be applied.

Conclusion

We told how you can hack the password for wi-fi, then the decision is yours, whether or not to hack this issue will be on your conscience. If you have enough funds, then, of course, you just need to remember to replenish your Internet in time. And then the question of how you can hack someone else's wi fi will disappear by itself. And of course, you shouldn't write off the excitement factor when you sometimes want to prove yourself at least in something.

You can also read:

  • The author of the article, the translation of which we are publishing today, wants to talk about how to hack a Wi-Fi network, for which the WPA and WPA2 protocols are used to protect.
  • The article was written for informational purposes only.
  • Hardware and software
  • I will be using Kali Linux distribution installed on VMware Workstation.
  • In addition, I have an Alfa AWUS036NH 2000mW 802.11b / g / n Wi-Fi adapter at my disposal. Here are its main characteristics:
  • Standards: IEEE 802.11b / g / n, USB 2.0.

Data rates: 802.11b - 11 Mbps, 802.11g - 54 Mbps, 802.11n - 150 Mbps.

Antenna connector: 1 x RP-SMA.

Frequency bands: 2412 ~ 2462 MHz, 2412 ~ 2472 MHz, 2412 ~ 2484 MHz. 
Power supply: 5V.

Security: WEP 64/128, support 802.1X, WPS, WPA-PSK, WPA2.

Step 1

You need to run Kali Linux in VMware and connect the Alfa AWUS036NH Wi-Fi adapter to the system by following the following sequence of steps:

VM> Removable Devices> Ralink 802.11n USB Wireless Lan Card> Connect

Connecting a Wi-Fi adapter to an OS running in VMware

Step 2

Now take a look at the tools for managing Wi-Fi connections in Kali Linux.

Managing Wi-Fi Connections in Kali Linux

Step 3

Open a terminal and run the command

Using WiFiPhisher is simple, you need to:

airmon-ng

to display information about the interfaces of wireless networks.

Displaying information about the interfaces of wireless networks

Step 4

As you can see, the interface has been assigned a name

... Knowing this, execute the command in the terminal

airmon-ng start wlan0

... Thanks to this command, the Wi-Fi adapter will be put into monitoring mode.

Putting the adapter into monitoring mode

Step 5

Now run a command like this:

airodump-ng wlan0mon 

... This will allow you to get information about Wi-Fi networks deployed nearby, about what encryption methods are used in them, as well as about the SSID.

About Wi-Fi networks

Step 6

Now let's use this command:

airodump-ng -c [channel] –bssid [bssid] -w / root / Desktop / [monitor interface]

In it

[channel]

should be replaced with the target channel number,

.

[bssid]

- on the target BSSID, 
[monitor interface]

- to the monitoring interface

wlan0mon

As a result, my command will look like this:

airodump-ng -c 6 –bssid 4C: ED: FB: 8A: 4F: C0 -w / root / Desktop / wlan0mon

Executing a command

.

Step 7

Now you have to wait. Utility

airodump

will monitor the network, waiting for someone to connect to it. This will give us the opportunity to get handshake files that will be saved in the folder

/ root / Desktop

This is how the utility looked like until the moment someone connected to the network under investigation.

The program monitors the network

But what happens after something is connected to the network, and the program was able to obtain the necessary data. 

Obtaining the required data

Step 8

You can skip this step if you already have handshake files. An alternative way of obtaining the corresponding data is described here.

We are talking about using the following command:

aireplay-ng -0 2 -a [router bssid] -c [client bssid] wlan0mon

Here

[router bssid]

must be replaced with the BSSID of the Wi-Fi network, and

[client bssid]

- to the workstation identifier.

Now run a command like this:

This command allows you to get handshake data if you don't want to wait for someone to connect to the network. In fact, this command attacks the router by performing packet injection. Parameter 
  • -0 2 can be replaced with another number, for example, indicate here the number 50, or a higher number, and wait for the handshake data to be received
  • Using the aireplay-bg utility Step 9
  • aircrack-ng -a2 -b [router bssid] -w [path to wordlist] /root/Desktop/*.cap -a2
  • stands for WPA. -b

Is the BSSID of the network.

-w 

Is the path to the list of passwords.

* .cap

Is a pattern for the names of files containing passwords.

Добавить комментарий