Top Social

Go deep into wifi hacking using the techniques provided to you by us free of cost

Image Slider

5. Wifite- A fully automated tool for testing of WEP network

Hello Friends,Welcome back..
Today we are going to start attacking on wifi network. In this post, we will use a tool named wifite for testing purpose. Wifite is a tool which is specially designed  for penetration testing of WEP encrypted network. Means we can attack successfully using this tool on WEP encrypted network only. It is fully automated tool and it will initialize all the attacks like deauthentication, WPS Pixie Attack etc by itself.
Wifite tool generally takes 8 to 10 minutes for cracking of WEP network key without any dictionary.
All the WEP encrypted network are 100% hackable using this tool.
So without wasting much more time on theory lets begin our real hacking😊😊
The step by step instruction for using wifite tool with pictures are as follows.
Step 1> Open the terminal and type wifite.



















Step 2 > We are coming across two access point in which no one is WEP encrypted. In my range there is no WEP encrypted network available so i will show you only the steps on how to crack key of WEP network by taking the example of WPA2 Encrypted. I know that WPA2 is not hackable using wifite but the steps are same so this will help you in cracking WEP encrypted network.
Step 3>  Now Press CTRL+ C when you see your victim wifie and enter only the number of that wifi and wait for 8 to 10 minutes while Wifite tool doing its processing.









Thats all about wifite tool.. enjoy ethical hacking😊😊
Have a good day..

4. First Step Towards hacking of wifi (Modes of wireless cards)

Hello friends, This post is going to be more interesting because we are going to see everything practically from now. For hacking or performing penetration testing on the wifi networks we does not require much more things. We need these three things for attacking on any wifi network.
  1. MAC(Media Access Control)  Address of the router
  2. Channel on which wifi is operating
  3. Name of the wifi
We are going to perform all our practicals using kali linux Operating System which we have installed on our VM Ware. We need a wireless adapter or wifi card which is supported or capable of packet injection for doing these practicals.

Modes of wireless card 
Generally, there are two modes present in the wifi card.
The first one is Managed mode and the second one is monitor mode.
In managed mode, we can simply connect to a wifi network if we know the password of that wifi, while in Monitor mode we can perform penetration testing and different kinds of attacks on the wifi network like bruteforce or dictionary attack.
For checking in which mode your wifi card is open your terminal and the command is:  "iwconfig" without semicolon as shown below.

You can simply put your wifi card in monitor mode as:
airmon-ng start wlan0












In our next post we wil know how to find out MAC Address, channel and essid of any access point which is present nearby us.
Thank yuh.. have a nice day...

3. Different types of attacks on the wifi network

Hey guys.. today we will discuss about what are the various types of attacks that we can perform on a wifi network..
Make sure that for understanding all theconcepts clearly you have to read from the from the scratch which is already available to you on this blog. There are various types of attacks you can perform on the router or network. You will be surprised to know that most of the wireless attacks that we are going to perform on routers even without gaining the access to that router. What i am trying to say is "You can perform attacks on the wifi without knowing its password or key".
For example:
  1. You can apply a jammer attack on the whole network.
  2. You can de-authenticate any client or person from any wifi in your network.
  3. You can apply brute force attack.
  4. You can apply dictionary attacks and so on.
Is not it sound interesting?? The attacks which are performed after gaining the access to the wifi network will become more dangerous. The example of such types of attacks are as :
  1. Password sniffing
  2. DNS Spoofing
  3. Image Sniffing
  4. URL sniffing
We are only going to cover the attacks which can be performed before gaining the access of the router.
Stay active on our blogs for hacking tutorials...
Thanks.. Have fun..