How to hack Wi-Fi networks ( Educational )

How to hack Wi-Fi networks ( Educational )

How to Hack Wi-Fi Networks with WPA-PSK Encryption

In this video, the presenter explains how to hack Wi-Fi networks that use WPA-PSK encryption. The presenter explains how it works, how to do it, and how to protect yourself against it.

Understanding the Process

  • When you connect to a network from a wireless device, a handshake is sent from the device to the router.
  • This handshake contains the encrypted password.
  • A word list attack can be used by comparing both the actual handshake password and the encrypted password whenever they match.

Preparing for Hacking

  • You need a computer running Linux (preferably Kali Linux).
  • Figure out what your wireless interface name is by typing "ipa" in a terminal.
  • Turn on monitor mode for your network card using "airman.ng start" command followed by your wireless network interface name.

Hacking Process

  • Start listening to all of the networks around you with "air dump minus ng" command followed by your network's interface that has monitor mode turned on.
  • Save BSSID and channel number of your target network. Use "arrow dump minus ng minus d" command followed by BSSID, channel number, and file name that will contain captured handshake packets.

Capturing Handshake Packets

  • Run "arrow dump minus ng minus d" command followed by BSSID, channel number, file name containing captured handshake packets and finally network interface which is wlan0mon
  • Do a de-authentication attack to force the device to disconnect and reconnect, allowing you to capture the handshake packet.

Protecting Yourself

  • Use strong passwords that are not easily guessable.
  • Use WPA2 encryption instead of WPA-PSK.
  • Disable WPS (Wi-Fi Protected Setup).

Overall, this video provides a step-by-step guide on how to hack Wi-Fi networks with WPA-PSK encryption. It also explains how to protect yourself against such attacks.

Capturing a Handshake

In this section, the speaker explains how to capture a handshake using Kali Linux.

Capturing the Handshake

  • To capture a handshake, use the command airmon-ng start wlan0 to put your wireless card into monitor mode.
  • Then, use airodump-ng to find the target network's BSSID and channel.
  • Next, use aireplay-ng with the -0 option followed by 10 authentication packets, -a followed by the BSSID of the router, -c followed by the victim's ESSID, and finally, specify the network interface.
  • Press enter to send 10 deauthentication packets to force disconnect and reconnect of target device.
  • The handshake is captured when it reconnects.

Cracking Passwords

In this section, the speaker explains how to crack passwords using Kali Linux.

Cracking Passwords

  • After capturing a handshake, stop airodump-ng with Ctrl+C. A file will be saved in your current directory with a name you specified earlier.
  • Use aircrack-ng -w [location of word list] [name of capture file] to crack passwords.
  • Wait for some time until a match is found.
  • Choose a very long random password that is unlikely to be found in any word list to protect yourself against wordlist attacks.

Protecting Yourself Against Wordlist Attacks

In this section, the speaker explains how to protect yourself against wordlist attacks.

Protecting Yourself Against Wordlist Attacks

  • Choose a very long random password that is unlikely to be found in any word list.
Video description

This video will teach how to pentest / " hack " wifi networks that can be found anywhere. This video is for educational purposes only and is meant to help you understand how networks are commonly hacked to be able to protect yourself, family and friends against it. The issue highlighted in this video demonstration is from an old networking protocol that is rarely used in the modern world as WPA3 and some WPA2 routers & endpoints (such as mobile hotspots) employ "protected frames" that prevent deauthentication packets and essentially make this useless. - Kali linux: https://www.kali.org/ I recommend installing kali linux in a virtual machine, if you do not know how to do this please look up some videos on how to do it. Wifi / network hacking is not by itself illegal when used properly on authorized hardware, in other words you must MAKE SURE THAT YOU HAVE THE PROPER AUTHORIZATIONS OR OWN THE HARDWARE THAT IS BEING TESTED AS IT IS OTHERWISE ILLEGAL. It is beneficial to gain understanding on how attackers might look to attack your network to be able to prevent it before it happens, especially considering how most old networks are hackable with this method, so you can most certainly make improvement on your own network at home by for instance, as highlighted in the video, employ randomized long passwords that are unlikely to be present in word lists. Here are the timestamps: 0:00 Introduction 0:22 How it works 0:48 How to do it 5:03 How to protect yourself against this