get_wifi_password
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| get_wifi_password [2017/09/10 22:17] – [How to prevent this kind of attack] Santi | get_wifi_password [2019/01/04 13:06] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ===== How to get a Wifi password | + | ===== WiFi password |
| + | |||
| + | {{ wiki: | ||
| In this tutorial we are going to show how you can get a WiFi password from any visible APs around you. We will use the Aircrack-ng tool and, because we are going to use [[http:// | In this tutorial we are going to show how you can get a WiFi password from any visible APs around you. We will use the Aircrack-ng tool and, because we are going to use [[http:// | ||
| Line 68: | Line 70: | ||
| In the screehshot above you can see the list of the visible APs so you only have to select wich one you want to try to get its password. You will need its MAC address (you have it at the left of the screenshot) and the channel (CH column). | In the screehshot above you can see the list of the visible APs so you only have to select wich one you want to try to get its password. You will need its MAC address (you have it at the left of the screenshot) and the channel (CH column). | ||
| + | |||
| + | So, we are going to try to discover, in this case, the handshake of our own WiFI AP because the goal of this tutorial is to protect our infrastructure, | ||
| + | |||
| + | We have to search the name of our Wireless connection and take note of the MAC address. Our AP is called // | ||
| <code bash> | <code bash> | ||
| - | santi@kalibook: | + | santi@kalibook: |
| </ | </ | ||
| + | |||
| + | Now, we will see how airodump searching for the handshake: | ||
| + | |||
| + | < | ||
| + | {{ wiki: | ||
| + | < | ||
| + | |||
| + | When airodump has found the handshake it shows it on the left top corner of the screen and it continues working. When you see the handshake written in the corner you can stop airodump pressing '' | ||
| + | |||
| + | < | ||
| + | {{ wiki: | ||
| + | < | ||
| + | |||
| + | Once we have the handshake we have two choices: | ||
| + | * Crack the password (not possible if the WiFi connection use WPA/WPA2 encryption) | ||
| + | * Try to discover the password using a dictionary attack | ||
| + | |||
| + | By the moment we will try to discover the WiFi password by dictionary attack. To do that, first, we need a dictionary. Because we are using Kali we can found some dictionaries in the ''/ | ||
| + | |||
| + | First, we need to gunzip the file: | ||
| <code bash> | <code bash> | ||
| - | santi@kalibook: | + | santi@kalibook: |
| </ | </ | ||
| + | |||
| + | And now we can execute aircrack-ng with the dictionary file, the MAC address of the AP and the file that airodump has created once it has found the handshake. Normally, the file is named '' | ||
| + | |||
| + | <code bash> | ||
| + | santi@kalibook: | ||
| + | </ | ||
| + | |||
| + | We will see how aircrack-ng is searching the password trying with every word in the dictionary. | ||
| + | |||
| + | < | ||
| + | {{ wiki: | ||
| + | < | ||
| + | |||
| + | Once aircrack has found the password (if it did it), it will show it in the center of the screen. Then, you have the password to connect to this WiFi connection. | ||
| + | |||
| + | < | ||
| + | {{ wiki: | ||
| + | < | ||
| ===== How to prevent this kind of attack ===== | ===== How to prevent this kind of attack ===== | ||
| As you can see in the example above, it is not very difficult to perform an attack to get a WiFi password if the connection is not properly configured. We must notice the following aspects: | As you can see in the example above, it is not very difficult to perform an attack to get a WiFi password if the connection is not properly configured. We must notice the following aspects: | ||
| - | * Only select WPA/ | + | * You must select |
| - | * Change | + | * You must change |
| - | * You also can change the SSID of your Wifi connection. Notice that some companies put similar names to all WiFi routers they provide. In this case, it is easy to know which type of router you have and to look for, for example, an specific vulnerability on it. | + | * You also can change the SSID of your Wifi connection. Notice that some companies put similar names to all WiFi routers they provide. In this case, it is easy to know which type of router you have and to look for, for example, an specific vulnerability on it. An attacker can obtain passwords from an specific password generator that generates them following the same seed that the company of your router. |
| ---- | ---- | ||
| (c) 2017 Hacking Tony | (c) 2017 Hacking Tony | ||
get_wifi_password.1505081821.txt.gz · Last modified: 2019/01/04 13:06 (external edit)