Sunday, December 29, 2013

The missing ingredient

It didn't work!

Followed that tutorial right from the first line to the last one. Did everything it said, but still didn't get what you were looking for? Believe me, it was supposed to be that way. Step by step code execution on the cli is not what it takes to be a hacker. Every wireless adapter, computer system, operating system, and wireless network is different. There is no fixed set of code which is bound to work with all wifi's on all machines. Hacking is like mathematics. Knowing the formula doesn't mean you can solve all the problems, and seeing the solution of one problem will definitely not help you with another one. So, when you are hacking a WEP wifi network, what are you actually doing?





What were you doing?

Firstly, you are capturing the packets that the wifi network is... like throwing away in the air. The sole purpose of those packets is to indicate its presence. Airodump just takes all the packets that come its way and collects them. These packets usually contain some useful information.Secondly, you are using a program to extract the password from the captured data packets.

How were you doing it?

Now, firstly, we do something not completely required. We turn on monitor mode. Its just like creating a virtual interface which you'll use solely for monitoring purpose. Now this task is achieved my using airmon-ng and the new interface is called mon0.
Secondly, we use airodump-ng to capture packets from mon0 and store them in a file. Finally, we use aircrack-ng to use the data in the dump file to extract the password.

What problems are you going to face?

Most of the time, I have seen beginners are unable to configure their machines properly to a state where they can execute the commands. For this, look at the other tutorials.I am assuming you have Kali completely setup and running fine and accepting your wireless cards. So the problems-
  1. Not enough data packets.
  2. Not WEP encrypted. (i.e. WPA or WPA-2)
  3. Hidden
Now the last two problems will be dealt with in the tutorials to come. The first problem is very common and there is no straightforward way to deal with it. You can only try to speed up the data capture rate. There are a lot of ways to do that. A lot depends on how far you are from the network. I am writing a complete tutorial for this. But remember, hacking requires patience. You're gonna need it when you get to higher levels where you will bruteforce networks for the passwords.
For now, here is a great tutorial on getting data packets fast.

Speeding Up WEP Hacking

18 comments:

  1. Where did you learn all these things?

    ReplyDelete
    Replies
    1. On other people's blogs. I learn and I (try to) write in a way that is easier to understand for others.

      Delete
  2. Great Blog! I completely agree with you hacking is an art and it takes a lot of patience. I am in the process of trying to read as much as possible and have a good understanding that you should not be a script kiddie every computer will require different settings. What you do have to learn is what things really mean and what they are donig. I will continure to read your blog, Thanks for this.

    ReplyDelete
  3. Great Blog! I completely agree with you hacking is an art and it takes a lot of patience. I am in the process of trying to read as much as possible and have a good understanding that you should not be a script kiddie every computer will require different settings. What you do have to learn is what things really mean and what they are donig. I will continure to read your blog, Thanks for this.

    ReplyDelete
  4. i love you man nohomo

    ReplyDelete
  5. When I type airodump-ng mon0 is says ioctl(SIOCGFINDEX) failed: No such device.

    ReplyDelete
  6. So aircrack just looks up the content of the IPv4 packages and tries to find any packages that contain the WEP password unencrypted in binary?

    If I understood this correctly: In wich case will the network send out packages of the encryption password, let alone unsecured?

    I would love if you could elaborate that to me.
    Thanks in advance!

    ReplyDelete
  7. hi i am new here i am also running Online B2B marketplace project my team faced many challenges in i.t field.

    ReplyDelete
  8. Online Video Downloader by FreeVideosDownloader is a free web tool that allows you to download and convert online videos so that you can watch them whenever you want, even without an internet connection.

    ReplyDelete
  9. The PMAY beneficiary list is a crucial document for those seeking government support under the PMAY scheme, aimed at providing affordable housing to eligible citizens. This list features names of individuals who have been approved for financial assistance to build or purchase a home. It’s an essential resource for verifying eligibility and tracking the status of applications. Accessing this list helps beneficiaries confirm their inclusion in the scheme and ensures transparency in the allocation of funds. Updated regularly, it reflects the ongoing efforts of the government to provide housing solutions and uplift underserved communities.

    ReplyDelete
  10. The website https://bhulekhups.co/ provides a digital platform for accessing land records and property details in India. It offers users the ability to view and download land records, including ownership and tenancy details, by entering specific information related to the land parcel. This online service aims to enhance transparency in land administration and facilitate easier access to important property documents. By streamlining the process of obtaining land records, the site supports individuals, legal professionals, and government officials in managing and verifying land-related information efficiently. It represents a step towards digitizing and modernizing land record management in India.

    ReplyDelete
  11. Fantastic Blog! I absolutely agree with you that hacking is a skill that requires a great deal of patience. As I read as much as I can, I've come to the conclusion that you shouldn't be a script kiddie because every computer has distinct requirements. You do need to understand what things actually mean and how they work. I appreciate this and will keep reading your blog.

    ReplyDelete

© Kali Tutorials, 2016. Unauthorized use and/or duplication of this material without express and written permission from this site’s author and/or owner is strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to Shashwat Chaudhary and Kali Tutorials with appropriate and specific direction to the original content.