You could go through all these processes individually and kill them one by one, but luckily you can just run airmon-ng check kill and this will kill all conflicting processes at once. If you find that later on in this tutorial your capture stops working or you can’t get it to start, you can use airmon-ng check in your terminal and it will show you any processes that could be causing issues with the aircrack-ng suite. (mac80211 monitor mode vif disabled for wlan0mon) (mac80211 station mode vif enabled on wlan0) Phy1 wlan0mon ath9k_htc Atheros Communications, Inc. This interface should now be called wlan0mon. To change the wireless interface back into the managed mode, just type airmon-ng stop and then the name of your wireless interface. wlan0mon IEEE 802.11bgn Mode: Monitor Tx-Power=20 dBm Type iwconfig again in the terminal and you should see the mode on your chosen interface has now changed to monitor. (mac80211 station mode vif disabled for wlx00c0ca84bd4a) (mac80211 monitor mode vif enabled on wlan0mon Interface 15mon is too long for linux so it will be renamed to the old style (wlan#) name. Phy1 wlx00c0ca84bd4a ath9k_htc Atheros Communications, Inc. Phy0 wlp2s0 iwlwifi Intel Corporation Centrino Advanced-N 6235 (rev 24) If airodump-ng, aireplay-ng or airtun-ng stops working afterĪ short period of time, you may want to run 'airmon-ng check kill' $sudo airmon-ng start wlx00c0ca84bd4aįound 5 processes that could cause trouble. To start monitor mode just type airmon-ng start and the name of your wireless interface. We use airmon-ng to change the mode of the Wireless interface into monitor mode “remember not all wireless cards can go into monitor mode so check out my recommendations of two adapters that are 100% tried and tested above”. Notice: I have highlighted in red the mode my wireless adapters are currently running in, these are both in the default Managed mode at the moment also wlp2s0 is associated to a wireless access point called HempsTutorials and wlx00c0ca84bd4a is not associated to any. You can see above I have two wireless adapters in my laptop (Wlp2s0 and wlx00c0ca84bd4a) I am currently running this in Linux Mint so if you are following along and using Kali or another version of Linux these interfaces would probably be called Wlan0 and Wlan1. Tx excessive retries:0 Invalid misc:41 Missed beacon:0 Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0 Wlp2s0 IEEE 802.11abgn ESSID:"HempsTutorials" Retry short limit:7 RTS thr:off Fragment thr:off Mode:Managed Access Point: Not-Associated Tx-Power=20 dBm Wlx00c0ca84bd4a IEEE 802.11bgn ESSID:off/any To check which mode your wireless adapter is currently running as type iwconfig in the terminal. The first step is to change the mode of the wireless interface from the default of managed mode to monitor mode. Hashcat: The latest version can be downloaded from also already installed in Kali Linux but will need to install the latest drivers for your graphics card also it can’t be running in a virtual machine as you don’t get the full capabilities of the graphics card. The main thing to look out for when buying a USB wifi adapter for hacking/Pentesting is that it’s running an Atheros chipset.Īircrack-ng Suite: The latest version can be downloaded from if you are running Kali Linux a version of the aircrack-ng suit will already be installed. I have also had a lot of success using a TP-Link TL-WN722N this is a great little dongle for the price but the Alfa is the better adapter. Wireless adapter: This needs to be capable of running in monitor mode, I am currently using an Alfa AWUS036NHA USB adapter, You can purchase one of these through my Amazon affiliate link here everything made from this goes back into Hemp Tutorials to help keep the lights on. I’ll be using the aircrack-ng suite of tools to capture the 4-way handshake\wireless password and then the power of Hashcat to crack the wireless password using the graphics card built into my laptop to speed up the whole process. We can then capture the password at this time and attempt to crack it. When a client authenticates to an access point the client and the access point go through a 4 step process to authenticate the user to the access point. The weakness in WPA/WPA2 wireless passwords is that the encrypted password is shared in what is known as a 4-way handshake. This I hope will be part of a new series of tutorials dedicated to hacking wireless networks. In this tutorial, I will show you how to capture and then crack WPA/WPA2 Wireless passwords.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |