SlideShare a Scribd company logo
1 of 19
Download to read offline
How to Hack WPA (Wi-FiHow to Hack WPA (Wi-Fi
Protected Access) WirelessProtected Access) Wireless
Internet Using Aircrack-ngInternet Using Aircrack-ng
Presented By:Presented By:
Nikesh BalamiNikesh Balami
 This presentation is intended to inform theThis presentation is intended to inform the
audience about methods used to “Hack”audience about methods used to “Hack”
wireless internet connections, not for anywireless internet connections, not for any
malicious use but strictly for educationalmalicious use but strictly for educational
purposes and personal intentions such aspurposes and personal intentions such as
recovering a misplaced network key forrecovering a misplaced network key for
the users own wireless connection.the users own wireless connection.
WPA or WPA2WPA or WPA2
 Stands for Wi-Fi Protected AccessStands for Wi-Fi Protected Access
 Created to provide stronger securityCreated to provide stronger security
 Still able to be cracked if a short password isStill able to be cracked if a short password is
used.used.
 WPA 1WPA 1
–– Based on 3rd draft of 802.11iBased on 3rd draft of 802.11i
–– Uses TKIPUses TKIP
–– Backward compatible with old hardwareBackward compatible with old hardware
 WPA 2WPA 2
––Based on 802.11iBased on 802.11i
–– Uses CCMP (AES)Uses CCMP (AES)
–– Not compatible with old hardwareNot compatible with old hardware
Aircrack-ngAircrack-ng
““Aircrack-ng is an 802.11 WEP and WPA-PSKAircrack-ng is an 802.11 WEP and WPA-PSK
keys cracking program that can recover keyskeys cracking program that can recover keys
once enough data packets have been captured.once enough data packets have been captured.
It implements the standard FMS attack alongIt implements the standard FMS attack along
with some optimizations like KoreK attacks, aswith some optimizations like KoreK attacks, as
well as the all-new PTW attack, thus making thewell as the all-new PTW attack, thus making the
attack much faster compared to other WEPattack much faster compared to other WEP
cracking tools. In fact, Aircrack-ng is a set ofcracking tools. In fact, Aircrack-ng is a set of
tools for auditing wireless networks.”tools for auditing wireless networks.”
Tools used in this PresentationTools used in this Presentation
 Wi-Fi BoosterWi-Fi Booster
 VMware WorkstationVMware Workstation
 Backtrack 5 r3Backtrack 5 r3
Wi-Fi BoosterWi-Fi Booster
o Make broadband wireless in possibleMake broadband wireless in possible
coveragecoverage
o Strengthen radio signal to increase theStrengthen radio signal to increase the
effective range and coverage area foreffective range and coverage area for
Wi-Fi communicationWi-Fi communication
o Install easily, just plug in and playInstall easily, just plug in and play
o Save lots of wiring costsSave lots of wiring costs
VMware WorkstationVMware Workstation
 Secure way to run multiple operatingSecure way to run multiple operating
systems at the same time.systems at the same time.
 It is an integral component of any seriousIt is an integral component of any serious
technical professional’s toolkit.technical professional’s toolkit.
 It offers the broadest host and guestIt offers the broadest host and guest
operating system support, the richest useroperating system support, the richest user
experience, and the most comprehensiveexperience, and the most comprehensive
feature set.feature set.
BacktrackBacktrack
Backtrack is an operating systemBacktrack is an operating system
based on the Ubuntu GNU/Linuxbased on the Ubuntu GNU/Linux
distribution aimed at digital forensicsdistribution aimed at digital forensics
and penetration testing use. It is namedand penetration testing use. It is named
after backtracking, a search algorithm.after backtracking, a search algorithm.
The current version is Backtrack 5,The current version is Backtrack 5,
code name “Revolution.”code name “Revolution.”
Backtrack ToolsBacktrack Tools
BackTrack includes many well known security tools including:BackTrack includes many well known security tools including:
o Metasploit integrationMetasploit integration
o RFMON Injection capable wireless driversRFMON Injection capable wireless drivers
o Aircrack-NGAircrack-NG
o KismetKismet
o NmapNmap
o OphcrackOphcrack
o EttercapEttercap
o Wireshark (formerly known as Ethereal)Wireshark (formerly known as Ethereal)
o BeEF (Browser Exploitation Framework)BeEF (Browser Exploitation Framework)
o HydraHydra
ProcessProcess
 Install a VMware workstation on yourInstall a VMware workstation on your
ComputerComputer
 Open the Vmware workstation and installOpen the Vmware workstation and install
Backtrack 5 r3 on itBacktrack 5 r3 on it
 After completing installationAfter completing installation
 Go to VM>Removable DeviceGo to VM>Removable Device
 And now connect your Wi-Fi Booster orAnd now connect your Wi-Fi Booster or
Wi-Fi Receiver on itWi-Fi Receiver on it
Process Cont…Process Cont…
 Now after doing all of this your BacktrackNow after doing all of this your Backtrack
5 r3 is ready to use5 r3 is ready to use
 Open the Terminal of backtrack 5 r3Open the Terminal of backtrack 5 r3
 And type “And type “airmon-ngairmon-ng” to check our Wi-Fi” to check our Wi-Fi
Booster works on it or notBooster works on it or not
 Again type “Again type “airmon-ng start wlan0airmon-ng start wlan0” to” to
create a new mon0 interfacecreate a new mon0 interface
How To See Weather OurHow To See Weather Our
Booster Works Or NotBooster Works Or Not
Process Cont…Process Cont…
 Now type “Now type “airodump-ng mon0airodump-ng mon0” to see the” to see the
connection and use “connection and use “wash –i mon0wash –i mon0” to see” to see
the WPS “ON” connectionthe WPS “ON” connection
 After successful completion of the processAfter successful completion of the process
you will see the BSSID of the connectionyou will see the BSSID of the connection
at the first line . Copy that BSSID andat the first line . Copy that BSSID and
keep it at the safe.keep it at the safe.
How To Get BSSIDHow To Get BSSID
Process Cont…Process Cont…
 Last step . Attacking the connection usingLast step . Attacking the connection using
reaverreaver
 Type the code at the Terminal “Type the code at the Terminal “reaver –ireaver –i
mon0 –b <<paste the BSSID over hear>>mon0 –b <<paste the BSSID over hear>>
-vv-vv””
 After waiting for an hours you will got theAfter waiting for an hours you will got the
keykey
Attacking With ReaverAttacking With Reaver
Problem Occurs While HackingProblem Occurs While Hacking
ProblemProblem
Happy Hacking

More Related Content

What's hot

WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and ProtectionChandrak Trivedi
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminarNilesh Sapariya
 
Introduction To Exploitation & Metasploit
Introduction To Exploitation & MetasploitIntroduction To Exploitation & Metasploit
Introduction To Exploitation & MetasploitRaghav Bisht
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)Papun Papun
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 
Introduction to Windows Dictionary Attacks
Introduction to Windows Dictionary AttacksIntroduction to Windows Dictionary Attacks
Introduction to Windows Dictionary AttacksScott Sutherland
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authenticationdkaya
 
DDoS Attack Detection & Mitigation in SDN
DDoS Attack Detection & Mitigation in SDNDDoS Attack Detection & Mitigation in SDN
DDoS Attack Detection & Mitigation in SDNChao Chen
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerNaveen Kumar
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolMohammed Adam
 

What's hot (20)

Wi-fi Hacking
Wi-fi HackingWi-fi Hacking
Wi-fi Hacking
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Cloud security
Cloud securityCloud security
Cloud security
 
Introduction To Exploitation & Metasploit
Introduction To Exploitation & MetasploitIntroduction To Exploitation & Metasploit
Introduction To Exploitation & Metasploit
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless AttacksPACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless Attacks
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
SSL TLS Protocol
SSL TLS ProtocolSSL TLS Protocol
SSL TLS Protocol
 
Introduction to Windows Dictionary Attacks
Introduction to Windows Dictionary AttacksIntroduction to Windows Dictionary Attacks
Introduction to Windows Dictionary Attacks
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
 
DDoS Attack Detection & Mitigation in SDN
DDoS Attack Detection & Mitigation in SDNDDoS Attack Detection & Mitigation in SDN
DDoS Attack Detection & Mitigation in SDN
 
Web uygulama açıklıklarından faydalanarak sistem ele geçirme
Web uygulama açıklıklarından faydalanarak sistem ele geçirmeWeb uygulama açıklıklarından faydalanarak sistem ele geçirme
Web uygulama açıklıklarından faydalanarak sistem ele geçirme
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
What is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) ProtocolWhat is SSL ? The Secure Sockets Layer (SSL) Protocol
What is SSL ? The Secure Sockets Layer (SSL) Protocol
 
Hash function
Hash function Hash function
Hash function
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 

Similar to How to hack wireless internet connections using aircrack-ng

Hack wifi password using kali linux
Hack wifi password using kali linuxHack wifi password using kali linux
Hack wifi password using kali linuxHelder Oliveira
 
How to Hack WiFi on Windows
How to Hack WiFi  on Windows How to Hack WiFi  on Windows
How to Hack WiFi on Windows Vrushank Narola
 
Cracking WEP Secured Wireless Networks
Cracking WEP Secured Wireless NetworksCracking WEP Secured Wireless Networks
Cracking WEP Secured Wireless NetworksHammam Samara
 
Wi fi wireless network
Wi fi wireless networkWi fi wireless network
Wi fi wireless networkJauwadSyed
 
2600 av evasion_deuce
2600 av evasion_deuce2600 av evasion_deuce
2600 av evasion_deuceDb Cooper
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Mohammad Fareed
 
Wireless Pentesting: It's more than cracking WEP
Wireless Pentesting: It's  more than cracking WEPWireless Pentesting: It's  more than cracking WEP
Wireless Pentesting: It's more than cracking WEPJoe McCray
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730Netgear Italia
 
How to WRAPS like Snoop Dogg
How to WRAPS like Snoop DoggHow to WRAPS like Snoop Dogg
How to WRAPS like Snoop DoggAlex Kim
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hackingMihir Shah
 

Similar to How to hack wireless internet connections using aircrack-ng (20)

Hack wifi password using kali linux
Hack wifi password using kali linuxHack wifi password using kali linux
Hack wifi password using kali linux
 
Wi-FI Hacking
Wi-FI Hacking Wi-FI Hacking
Wi-FI Hacking
 
How to Hack WiFi on Windows
How to Hack WiFi  on Windows How to Hack WiFi  on Windows
How to Hack WiFi on Windows
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
WIFI Hacking
WIFI HackingWIFI Hacking
WIFI Hacking
 
Backtrack Manual Part4
Backtrack Manual Part4Backtrack Manual Part4
Backtrack Manual Part4
 
voip_en
voip_envoip_en
voip_en
 
Wi-Foo Ninjitsu Exploitation
Wi-Foo Ninjitsu ExploitationWi-Foo Ninjitsu Exploitation
Wi-Foo Ninjitsu Exploitation
 
Cracking WEP Secured Wireless Networks
Cracking WEP Secured Wireless NetworksCracking WEP Secured Wireless Networks
Cracking WEP Secured Wireless Networks
 
Wi fi wireless network
Wi fi wireless networkWi fi wireless network
Wi fi wireless network
 
2600 av evasion_deuce
2600 av evasion_deuce2600 av evasion_deuce
2600 av evasion_deuce
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018
 
Manual repetidor wi fi
Manual repetidor wi fiManual repetidor wi fi
Manual repetidor wi fi
 
WiFi security
WiFi security WiFi security
WiFi security
 
Wireless Pentesting: It's more than cracking WEP
Wireless Pentesting: It's  more than cracking WEPWireless Pentesting: It's  more than cracking WEP
Wireless Pentesting: It's more than cracking WEP
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730
 
How to WRAPS like Snoop Dogg
How to WRAPS like Snoop DoggHow to WRAPS like Snoop Dogg
How to WRAPS like Snoop Dogg
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 

More from Open Knowledge Nepal

Grassroots awareness and the impact of Civic Tech in Nepal
Grassroots awareness and the impact of Civic Tech in NepalGrassroots awareness and the impact of Civic Tech in Nepal
Grassroots awareness and the impact of Civic Tech in NepalOpen Knowledge Nepal
 
Open Data and Artificial Intelligence
Open Data and Artificial IntelligenceOpen Data and Artificial Intelligence
Open Data and Artificial IntelligenceOpen Knowledge Nepal
 
Open Access Publishing: Developing Countries
Open Access Publishing: Developing CountriesOpen Access Publishing: Developing Countries
Open Access Publishing: Developing CountriesOpen Knowledge Nepal
 
Information and Technology, not an Hard Subject
Information and Technology, not an Hard SubjectInformation and Technology, not an Hard Subject
Information and Technology, not an Hard SubjectOpen Knowledge Nepal
 
Magic of RATs(Remote Access Torgens)
Magic of RATs(Remote Access Torgens)Magic of RATs(Remote Access Torgens)
Magic of RATs(Remote Access Torgens)Open Knowledge Nepal
 
AOSC Orentation for 1st Year student
AOSC Orentation for 1st Year studentAOSC Orentation for 1st Year student
AOSC Orentation for 1st Year studentOpen Knowledge Nepal
 

More from Open Knowledge Nepal (20)

Grassroots awareness and the impact of Civic Tech in Nepal
Grassroots awareness and the impact of Civic Tech in NepalGrassroots awareness and the impact of Civic Tech in Nepal
Grassroots awareness and the impact of Civic Tech in Nepal
 
Open Data and Artificial Intelligence
Open Data and Artificial IntelligenceOpen Data and Artificial Intelligence
Open Data and Artificial Intelligence
 
Code for Nepal and Open Data
Code for Nepal and Open DataCode for Nepal and Open Data
Code for Nepal and Open Data
 
Open Knowledge Network
Open Knowledge NetworkOpen Knowledge Network
Open Knowledge Network
 
Open Knowledge & PublicBodies Nepal
Open Knowledge & PublicBodies NepalOpen Knowledge & PublicBodies Nepal
Open Knowledge & PublicBodies Nepal
 
Open Data and Nepal Open Data Index
Open Data and Nepal Open Data IndexOpen Data and Nepal Open Data Index
Open Data and Nepal Open Data Index
 
Open Data - What and How??
Open Data - What and How??Open Data - What and How??
Open Data - What and How??
 
Open Access Publishing: Developing Countries
Open Access Publishing: Developing CountriesOpen Access Publishing: Developing Countries
Open Access Publishing: Developing Countries
 
Global - Local Open Data Index
Global - Local Open Data Index Global - Local Open Data Index
Global - Local Open Data Index
 
Information and Technology, not an Hard Subject
Information and Technology, not an Hard SubjectInformation and Technology, not an Hard Subject
Information and Technology, not an Hard Subject
 
Ball Eater
Ball EaterBall Eater
Ball Eater
 
Magic of RATs(Remote Access Torgens)
Magic of RATs(Remote Access Torgens)Magic of RATs(Remote Access Torgens)
Magic of RATs(Remote Access Torgens)
 
Intro to Data visualization
Intro to Data visualization Intro to Data visualization
Intro to Data visualization
 
Firefox Student Ambassador
Firefox Student Ambassador Firefox Student Ambassador
Firefox Student Ambassador
 
Firefox Student Ambassador (FSA)
Firefox Student Ambassador (FSA)Firefox Student Ambassador (FSA)
Firefox Student Ambassador (FSA)
 
Machine Learning and Robotic Vision
Machine Learning and Robotic VisionMachine Learning and Robotic Vision
Machine Learning and Robotic Vision
 
Nepal
Nepal Nepal
Nepal
 
AOSC Orentation for 1st Year student
AOSC Orentation for 1st Year studentAOSC Orentation for 1st Year student
AOSC Orentation for 1st Year student
 
Acme Firefox Presentation
Acme Firefox PresentationAcme Firefox Presentation
Acme Firefox Presentation
 
Day 3-Important stuff
Day 3-Important stuffDay 3-Important stuff
Day 3-Important stuff
 

Recently uploaded

BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
DBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdfDBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdfChristalin Nelson
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...Nguyen Thanh Tu Collection
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
The role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenshipThe role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenshipKarl Donert
 
Shark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsShark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsArubSultan
 
How to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineHow to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineCeline George
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...Nguyen Thanh Tu Collection
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesVijayaLaxmi84
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
DBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdfDBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - I-LEARN SMART WORLD - CẢ NĂM - CÓ FILE NGHE (BẢN...
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
The role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenshipThe role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenship
 
Shark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsShark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristics
 
Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...Introduction to Research ,Need for research, Need for design of Experiments, ...
Introduction to Research ,Need for research, Need for design of Experiments, ...
 
How to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command LineHow to Uninstall a Module in Odoo 17 Using Command Line
How to Uninstall a Module in Odoo 17 Using Command Line
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN THEO CÂU CHO HỌC SINH LỚP 12 ĐỂ ĐẠT ĐIỂM 5+ THI TỐT NGHIỆP THPT ...
 
Sulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their usesSulphonamides, mechanisms and their uses
Sulphonamides, mechanisms and their uses
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 

How to hack wireless internet connections using aircrack-ng

  • 1. How to Hack WPA (Wi-FiHow to Hack WPA (Wi-Fi Protected Access) WirelessProtected Access) Wireless Internet Using Aircrack-ngInternet Using Aircrack-ng Presented By:Presented By: Nikesh BalamiNikesh Balami
  • 2.  This presentation is intended to inform theThis presentation is intended to inform the audience about methods used to “Hack”audience about methods used to “Hack” wireless internet connections, not for anywireless internet connections, not for any malicious use but strictly for educationalmalicious use but strictly for educational purposes and personal intentions such aspurposes and personal intentions such as recovering a misplaced network key forrecovering a misplaced network key for the users own wireless connection.the users own wireless connection.
  • 3. WPA or WPA2WPA or WPA2  Stands for Wi-Fi Protected AccessStands for Wi-Fi Protected Access  Created to provide stronger securityCreated to provide stronger security  Still able to be cracked if a short password isStill able to be cracked if a short password is used.used.  WPA 1WPA 1 –– Based on 3rd draft of 802.11iBased on 3rd draft of 802.11i –– Uses TKIPUses TKIP –– Backward compatible with old hardwareBackward compatible with old hardware  WPA 2WPA 2 ––Based on 802.11iBased on 802.11i –– Uses CCMP (AES)Uses CCMP (AES) –– Not compatible with old hardwareNot compatible with old hardware
  • 4. Aircrack-ngAircrack-ng ““Aircrack-ng is an 802.11 WEP and WPA-PSKAircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keyskeys cracking program that can recover keys once enough data packets have been captured.once enough data packets have been captured. It implements the standard FMS attack alongIt implements the standard FMS attack along with some optimizations like KoreK attacks, aswith some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making thewell as the all-new PTW attack, thus making the attack much faster compared to other WEPattack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set ofcracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks.”tools for auditing wireless networks.”
  • 5. Tools used in this PresentationTools used in this Presentation  Wi-Fi BoosterWi-Fi Booster  VMware WorkstationVMware Workstation  Backtrack 5 r3Backtrack 5 r3
  • 6. Wi-Fi BoosterWi-Fi Booster o Make broadband wireless in possibleMake broadband wireless in possible coveragecoverage o Strengthen radio signal to increase theStrengthen radio signal to increase the effective range and coverage area foreffective range and coverage area for Wi-Fi communicationWi-Fi communication o Install easily, just plug in and playInstall easily, just plug in and play o Save lots of wiring costsSave lots of wiring costs
  • 7. VMware WorkstationVMware Workstation  Secure way to run multiple operatingSecure way to run multiple operating systems at the same time.systems at the same time.  It is an integral component of any seriousIt is an integral component of any serious technical professional’s toolkit.technical professional’s toolkit.  It offers the broadest host and guestIt offers the broadest host and guest operating system support, the richest useroperating system support, the richest user experience, and the most comprehensiveexperience, and the most comprehensive feature set.feature set.
  • 8. BacktrackBacktrack Backtrack is an operating systemBacktrack is an operating system based on the Ubuntu GNU/Linuxbased on the Ubuntu GNU/Linux distribution aimed at digital forensicsdistribution aimed at digital forensics and penetration testing use. It is namedand penetration testing use. It is named after backtracking, a search algorithm.after backtracking, a search algorithm. The current version is Backtrack 5,The current version is Backtrack 5, code name “Revolution.”code name “Revolution.”
  • 9. Backtrack ToolsBacktrack Tools BackTrack includes many well known security tools including:BackTrack includes many well known security tools including: o Metasploit integrationMetasploit integration o RFMON Injection capable wireless driversRFMON Injection capable wireless drivers o Aircrack-NGAircrack-NG o KismetKismet o NmapNmap o OphcrackOphcrack o EttercapEttercap o Wireshark (formerly known as Ethereal)Wireshark (formerly known as Ethereal) o BeEF (Browser Exploitation Framework)BeEF (Browser Exploitation Framework) o HydraHydra
  • 10. ProcessProcess  Install a VMware workstation on yourInstall a VMware workstation on your ComputerComputer  Open the Vmware workstation and installOpen the Vmware workstation and install Backtrack 5 r3 on itBacktrack 5 r3 on it  After completing installationAfter completing installation  Go to VM>Removable DeviceGo to VM>Removable Device  And now connect your Wi-Fi Booster orAnd now connect your Wi-Fi Booster or Wi-Fi Receiver on itWi-Fi Receiver on it
  • 11. Process Cont…Process Cont…  Now after doing all of this your BacktrackNow after doing all of this your Backtrack 5 r3 is ready to use5 r3 is ready to use  Open the Terminal of backtrack 5 r3Open the Terminal of backtrack 5 r3  And type “And type “airmon-ngairmon-ng” to check our Wi-Fi” to check our Wi-Fi Booster works on it or notBooster works on it or not  Again type “Again type “airmon-ng start wlan0airmon-ng start wlan0” to” to create a new mon0 interfacecreate a new mon0 interface
  • 12. How To See Weather OurHow To See Weather Our Booster Works Or NotBooster Works Or Not
  • 13. Process Cont…Process Cont…  Now type “Now type “airodump-ng mon0airodump-ng mon0” to see the” to see the connection and use “connection and use “wash –i mon0wash –i mon0” to see” to see the WPS “ON” connectionthe WPS “ON” connection  After successful completion of the processAfter successful completion of the process you will see the BSSID of the connectionyou will see the BSSID of the connection at the first line . Copy that BSSID andat the first line . Copy that BSSID and keep it at the safe.keep it at the safe.
  • 14. How To Get BSSIDHow To Get BSSID
  • 15. Process Cont…Process Cont…  Last step . Attacking the connection usingLast step . Attacking the connection using reaverreaver  Type the code at the Terminal “Type the code at the Terminal “reaver –ireaver –i mon0 –b <<paste the BSSID over hear>>mon0 –b <<paste the BSSID over hear>> -vv-vv””  After waiting for an hours you will got theAfter waiting for an hours you will got the keykey
  • 17. Problem Occurs While HackingProblem Occurs While Hacking