Start Cracking the WPA/WPA2 Password (MsaCorporation)

Start Cracking the WPA/WPA2 Password  Here are the basics steps we will be going through: Put your wireless interface in monitor mode on the...

Start Cracking the WPA/WPA2 Password 

Here are the basics steps we will be going through:

  • Put your wireless interface in monitor mode on the specific AP channel
  • Start airodump-ng to collect authentication handshake from the AP
  • Use aireplay-ng to deauthenticate the wireless client to force a handshake with the AP
  • Run aircrack-ng to crack the pre-shared key using a dictionary file

Launch the Konsole, which is the BackTrack’s built-in command line. It can be found in the lower left corner of the taskbar as showing in the image below.

Run the following command to get a list of your network interfaces:

You may get something like “ath1″, “wlan0″, “wifi0″, or “ra0″…. This is called your interface.
In My Case: (interface)=wlan0 (see image below)

Now run the following command to put your interface in monitor mode.

airmon-ng start (interface)

In my case
airmon-ng start wlan0

Now we can use the monitor interface which appears below the Driver column, call it (monitor). Most of the time (monitor)=mon0 as shown in the image above.
It’s time to view the list of available networks and pick one for cracking. Run:
airodump-ng (monitor)

In my case
airodump-ng mon0

Wait for some time for all the networks to load then press Ctrl+C to stop the updates. Now choose the wireless network that you wish to crack which has “WPA” or “WPA2″ encryption in the “ENC” column, and “PSK” in the “AUTH” column. “OPN” means that the network is open and you can connect to it without a key, WEP will not work here but you can check How to Crack WEP Wireless with BackTrack 4 running on Windows which takes less than 5 minutes to crack.

After selecting the network that you want to crack take note of the BSSID, and the channel (CH) values. In my case: (bssid)=68:7F:74:06:69:C7, and (channel)=11 as shown in the image below.
Now we are going to monitor and record the data passing through that network to a file. Run:
airodump-ng (monitor) --channel (channel) --bssid (bssid) -w (filename)

In my case
airodump-ng mon0 --channel 1 --bssid 68:7F:74:06:69:C7Â -w linksys

Replace (monitor), (channel), and (bssid) with their respective values noted before. (filename) can be any name. I usually use a name similar to the name of the network which is “linksys” in this case.

The data is being collected and recorded now and you should get an output similar to the window in the background shown in the picture below. Leave that window running.
We now need to record the 4-way handshake that happens between the targeted wireless router (AP) and a client that is already authenticated.
We can either wait for a client to connect or disconnect an already connected user to force him to reconnect. In our case we are going to disconnect an already connected user. Don’t forget to note down the client mac address which we’ll call station. In my case (station)=00:C0:CA:25:AC:68. Launch a second Konsole window now and run:
aireplay-ng -0 1 -a (bssid) -c (station) (monitor)

In my case
aireplay-ng -0 1 -a 68:7F:74:06:69:C7Â -c 00:C0:CA:25:AC:68Â mon0

After you run this command you should see “WPA handshake: (bssid)” in the upper right corner of the first Konsole, in my case it is “WPA handshake: 68:7F:74:06:69:C7″. This means that you have collected the 4-way handshake, and you don’t need to be connected to the network anymore.
In case you didn’t see the handshake message try to run the same command again. It’s time to start cracking the collected password.

Cracking the Password
To crack the password you will need a file that contains list of passwords, this file is called a dictionary file. The more accurate the dictionary file and less complex the WPA or WPA2 wireless password; the better chance you have to crack the password. There are lots of dictionary files on the internet that you can download, for the purpose of the demo I am going to use the dictionary file that comes with aircrack-ng. It can be found under “/pentest/wireless/aircrack-ng/test”.

You can close all the Konsoles if you want and open a new one. Run:

aircrack-ng -w (passwordsfile) -b (bssid) (filename-01.cap)

In my case

aircrack-ng -w /pentest/wireless/aircrack-ng/test/password.lst -b 68:7F:74:06:69:C7 linksys-01.cap

The filename should be what you used in (filename) + “-01.cap”, if you are not sure about the (filename) enter “ls” to see list of all the files.
This command will start trying the passwords listed in the dictionary file that you provided until it finds a match. If the password wasn’t found then you need to use a better dictionary file. It is possible that the password can not be found at all in case it was long and complex enough! 

But in case there was a match then you should see something like:

The WPA or WPA2 password is what you see besides “KEY FOUND!” inside the brackets

<•>> Warning & Notice <<•>
All tricks in this Group/Page/are only for educational purpose. Learn these tricks only for your knowledge. Please donot try these to harm any one. We will not take any responsibility in any case.

<•>> For More Join Us <<•>



Peace Out ✌️

You can discuss this and other topics on our Facebook Group. Do not forget to follow us on our Facebook Page to keep you always aware of the latest Updates. If you are enjoying our content, please leave us a rating and a review on our Facebook Page. And as always, if you find the information useful, please share it with your friends and colleagues on Facebook, Twitter and everywhere you want. Peace Out. :)

Action,1,Activators,2,AdSense,3,Adwords,1,Alexa,1,AliExpress,1,Amazon,1,AMD,2,Android,24,Antivirus,2,App Development,1,Apple,7,Apps & Games,9,Apps For PC,2,Artificial Intelligence,1,Asus,1,Automotive,1,Basic Income,1,Bikes,3,Bitcoin,8,Bitcoin Mining,2,Bitcoin Pakistan,3,Blogging,13,Blogiapa,1,BlueStacks,1,Browser,2,Careers,1,Chopper,1,Chrome,1,Chromebooks,1,Cmd Tutorials,1,Communication,1,Computer Games,5,Cryptocurrency,8,Data Recovery,5,Did You Know ?,6,DJI,1,E-Learning,2,Ebikes,1,Ebooks,1,Education,3,Email Marketing,1,Eset,1,Facebook,5,Gadgets,3,Game,20,Gamebird,1,GearBest Deals,5,Geo News,1,Google,12,Google Play,1,Google Products,4,GPU Rigs,1,Guest Post,10,Hacking News,1,Hacking Tutorials,3,Hardware,3,HarmonyOS,7,Hi-Speed,1,HongMeng OS,4,Honor,2,How to (Guide),1,Howto,22,Huawei,26,IBM,1,Infinix Phones,1,Information Technology,11,Intel,2,Internet,3,Internet Marketing,2,iOS,3,iPhone,1,Keyboard,1,Laptops,4,Latest News,2,Make Money Online,1,MediaTek,2,Meizu,1,Microsoft,2,Motorcycle,1,Msa Pc World,2,Networks,2,News,73,Office and News,1,Office Applications,4,Online Business,6,Oppo,5,Organic Traffic,1,OUKITEL,1,Pakistan,6,Pakistan General Election 2018,1,Pc Games,3,Phones Under 20000,1,Photo & Video,2,PhotoScape,1,Playstation,1,Programming,2,PUBG,4,Razer,1,Reviews,5,Samsung,1,Script,1,Security,8,SEO,2,Shooting,1,Smartphones,1,Social Marketing,5,Social Media,3,Software,19,Sony,1,Sports,1,SwiftDemand,1,Tech,24,Tech Deals,9,Tech Explained,1,Telenor Pakistan,1,Tips & Tricks,13,Tools,4,Top 10,1,Top 14,1,Tutorials,1,Ubisoft,1,Unboxing,1,Updates,3,Urdu Articles,1,User Guides,1,Vivo,2,Vulnerabilities,1,Waqar Zaka,1,Wearable Tech,1,Website Security,1,Wifi,1,Wifi Hacking,1,Windows,15,Windows 10,1,Xiaomi,7,YouTube Tips,4,YouTube Videos,4,
Blogiapa - Learn To Do More!: Start Cracking the WPA/WPA2 Password (MsaCorporation)
Start Cracking the WPA/WPA2 Password (MsaCorporation)
Blogiapa - Learn To Do More!
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy