How to hack Wi-Fi networks ( Educational )
How to Hack Wi-Fi Networks with WPA-PSK Encryption
In this video, the presenter explains how to hack Wi-Fi networks that use WPA-PSK encryption. The presenter explains how it works, how to do it, and how to protect yourself against it.
Understanding the Process
- When you connect to a network from a wireless device, a handshake is sent from the device to the router.
- This handshake contains the encrypted password.
- A word list attack can be used by comparing both the actual handshake password and the encrypted password whenever they match.
Preparing for Hacking
- You need a computer running Linux (preferably Kali Linux).
- Figure out what your wireless interface name is by typing "ipa" in a terminal.
- Turn on monitor mode for your network card using "airman.ng start" command followed by your wireless network interface name.
Hacking Process
- Start listening to all of the networks around you with "air dump minus ng" command followed by your network's interface that has monitor mode turned on.
- Save BSSID and channel number of your target network. Use "arrow dump minus ng minus d" command followed by BSSID, channel number, and file name that will contain captured handshake packets.
Capturing Handshake Packets
- Run "arrow dump minus ng minus d" command followed by BSSID, channel number, file name containing captured handshake packets and finally network interface which is wlan0mon
- Do a de-authentication attack to force the device to disconnect and reconnect, allowing you to capture the handshake packet.
Protecting Yourself
- Use strong passwords that are not easily guessable.
- Use WPA2 encryption instead of WPA-PSK.
- Disable WPS (Wi-Fi Protected Setup).
Overall, this video provides a step-by-step guide on how to hack Wi-Fi networks with WPA-PSK encryption. It also explains how to protect yourself against such attacks.
Capturing a Handshake
In this section, the speaker explains how to capture a handshake using Kali Linux.
Capturing the Handshake
- To capture a handshake, use the command
airmon-ng start wlan0to put your wireless card into monitor mode.
- Then, use
airodump-ngto find the target network's BSSID and channel.
- Next, use
aireplay-ngwith the-0option followed by 10 authentication packets,-afollowed by the BSSID of the router,-cfollowed by the victim's ESSID, and finally, specify the network interface.
- Press enter to send 10 deauthentication packets to force disconnect and reconnect of target device.
- The handshake is captured when it reconnects.
Cracking Passwords
In this section, the speaker explains how to crack passwords using Kali Linux.
Cracking Passwords
- After capturing a handshake, stop
airodump-ngwith Ctrl+C. A file will be saved in your current directory with a name you specified earlier.
- Use
aircrack-ng -w [location of word list] [name of capture file]to crack passwords.
- Wait for some time until a match is found.
- Choose a very long random password that is unlikely to be found in any word list to protect yourself against wordlist attacks.
Protecting Yourself Against Wordlist Attacks
In this section, the speaker explains how to protect yourself against wordlist attacks.
Protecting Yourself Against Wordlist Attacks
- Choose a very long random password that is unlikely to be found in any word list.