Top Social

Hacking techniques by Mayank Prajapati

Go deep into wifi hacking using the techniques provided to you by us free of cost

Image Slider

6. Reaver- A common tool for hacking WPS enabled routers

Reaver is tool which have high efficiency in breaking the passwords of WPS enabled routers.
This tool is developed by Tactical Network Solutions, Craig Heffner. Reaver uses bruteforce attack for getting the password of encrypted network. On an average reaver takes 4 to 10 hours to identify the password of WPA or WPA2 network. Reaver tool shows higher efficiency rate in case of WEP encrypted networks.
You will find reaver tool in the application menu of kali linux as shown on the picture.

Reaver tool is very easy to use. There are not much more commands to write down in the terminal for using this tool. The usage of this tool is described below with the help of the pictures.
You can simply type reaver to view the help of usage of reaver tool. This command will show you what are the options available for use in the reaver tool.
There are only two things needed for using reaver tool.
1. Monitor mode interface name
2. BSSID or MAC Address of the router

The BSSID of the router can be obtained very easily.
The Steps for using Reaver tool are as follows.

Step1. You just have to put your wireless card in monitor mode .
How to put your wirelesss card into monitor mode is described in our previous post. The link of that post is given below.
https://mayankhackwifi.blogspot.in/2018/04/5-first-step-towards-hacking-of-wifi.html

Step2. Now we have to scan the networks present in our range. The command for this purpose is given below with picture.

airodump-ng InterfaceName







After you press enter to this command above, then scanning of networks around your range will be started and you will get MAC address of the router or victim. You can identify the victim using the name which you can find out easily in the ESSID column.
After you specify your target or victim press Ctrl+C to stop scanning process.
Copy the MAC address of the victim now












Step3. Now you have to use reaver tool the usage of reaver tool as already described require MAC Address which is copied by previous step and name of the Monitor Mode Interface.
The command is as:

reaver -i InterfaceName -b BSSID -vvv -K 1









It will take some time for cracking the password  wait for that time..
This is all about Reaver tool.
Enjoy.....

5. Wifite- A fully automated tool for testing of WEP network

Hello Friends,Welcome back..
Today we are going to start attacking on wifi network. In this post, we will use a tool named wifite for testing purpose. Wifite is a tool which is specially designed  for penetration testing of WEP encrypted network. Means we can attack successfully using this tool on WEP encrypted network only. It is fully automated tool and it will initialize all the attacks like deauthentication, WPS Pixie Attack etc by itself.
Wifite tool generally takes 8 to 10 minutes for cracking of WEP network key without any dictionary.
All the WEP encrypted network are 100% hackable using this tool.
So without wasting much more time on theory lets begin our real hacking😊😊
The step by step instruction for using wifite tool with pictures are as follows.
Step 1> Open the terminal and type wifite.



















Step 2 > We are coming across two access point in which no one is WEP encrypted. In my range there is no WEP encrypted network available so i will show you only the steps on how to crack key of WEP network by taking the example of WPA2 Encrypted. I know that WPA2 is not hackable using wifite but the steps are same so this will help you in cracking WEP encrypted network.
Step 3>  Now Press CTRL+ C when you see your victim wifie and enter only the number of that wifi and wait for 8 to 10 minutes while Wifite tool doing its processing.









Thats all about wifite tool.. enjoy ethical hacking😊😊
Have a good day..

4. First Step Towards hacking of wifi (Modes of wireless cards)

Hello friends, This post is going to be more interesting because we are going to see everything practically from now. For hacking or performing penetration testing on the wifi networks we does not require much more things. We need these three things for attacking on any wifi network.
  1. MAC(Media Access Control)  Address of the router
  2. Channel on which wifi is operating
  3. Name of the wifi
We are going to perform all our practicals using kali linux Operating System which we have installed on our VM Ware. We need a wireless adapter or wifi card which is supported or capable of packet injection for doing these practicals.

Modes of wireless card 
Generally, there are two modes present in the wifi card.
The first one is Managed mode and the second one is monitor mode.
In managed mode, we can simply connect to a wifi network if we know the password of that wifi, while in Monitor mode we can perform penetration testing and different kinds of attacks on the wifi network like bruteforce or dictionary attack.
For checking in which mode your wifi card is open your terminal and the command is:  "iwconfig" without semicolon as shown below.

You can simply put your wifi card in monitor mode as:
airmon-ng start wlan0












In our next post we wil know how to find out MAC Address, channel and essid of any access point which is present nearby us.
Thank yuh.. have a nice day...

3. Different types of attacks on the wifi network

Hey guys.. today we will discuss about what are the various types of attacks that we can perform on a wifi network..
Make sure that for understanding all theconcepts clearly you have to read from the from the scratch which is already available to you on this blog. There are various types of attacks you can perform on the router or network. You will be surprised to know that most of the wireless attacks that we are going to perform on routers even without gaining the access to that router. What i am trying to say is "You can perform attacks on the wifi without knowing its password or key".
For example:
  1. You can apply a jammer attack on the whole network.
  2. You can de-authenticate any client or person from any wifi in your network.
  3. You can apply brute force attack.
  4. You can apply dictionary attacks and so on.
Is not it sound interesting?? The attacks which are performed after gaining the access to the wifi network will become more dangerous. The example of such types of attacks are as :
  1. Password sniffing
  2. DNS Spoofing
  3. Image Sniffing
  4. URL sniffing
We are only going to cover the attacks which can be performed before gaining the access of the router.
Stay active on our blogs for hacking tutorials...
Thanks.. Have fun..

2. Basics requirements for wireless penetration Testing


After our first post of introduction on wireless penetration testing or wireless hacking we are back with another post on what are basics requirements, tools and operating system needed for doing these kind of penetration testing.
Not all the attacks on wifi network need to be connected to that wifi on which we are going to attack.
Attacks like de-authenticating  any client from any router, whole network jamming and much more can be done without actually connected to the router. Without wasting much more time, we directly go on requirements which should be fulfilled before doing hacking attacks.
These requirements are as follows:
  • Laptop or pc with 4 gb minimum RAM(window 10 or 7 installed on it)
  • Linux operating system installed on vm ware
  • One alpha wireless adapter which support Linux operating system


1. Introduction to series of Wifi Penetration Testing


Hi guys, from today we are going to learn penetration testing of wifi networks. In this series we will see how a hacker attack your networks, what are steps that you can take to protect yourself, what are tools and minimum requirements to do penetration testing on wifi network. If you are a beginner and you do not know even a single terminology about wifi basics, do not worry at all, this is the right place for you. I am assuring you if you read my posts regularly and try to implement these in your daily life then you will learn a lot from this series without any prior knowledge.
So let us start with very basic knowledge of wifi security standards. This post will only tell you about the security standards used in wifi networks and their differences.
There are mainly three types of security standard we can use for securing and protecting our wifi network. These are as follows.

  • WEP (Wired Equivalent Privacy)
  • WPA (Wifi Protected Access)
  • WPA2
The differences in these standard are given below in the table.

Encryption
How it works
Security Level
WEP(Wired Equivalent Privacy)
It uses RC4 stream cipher.
It uses 64 or 128 bit key.
It is easily and 100% hackable.
Low
WPA(Wi-Fi Protected Access)
It has backward compatibility with WEP devices.
It also uses RC4 stream cipher but here the key size is 256 bit.
In this each client get new keys with TKIP.
Medium
WPA2
This is the latest standard of encryption and nowadays we are using it.
It replaces RC4 and TKIP with CCMP and AES algorithm.
High
Table1. Comparison of wireless encryptions techniques
So this is all about my first post. Patience is necessary for learning anything. I am going to teach you everything from scratch so that you do not feel any problem in later time when i will explain those complex topics.
Your feedback plays a very important role to encourage me for writing next post..
Thanks for your precious time..
 Enjoy learning.............