Hack Wifi Password Mac Wpa2

Now we are disconnecting a user from wifi to capture a handshake. Type this command: aireplay-ng -0 3 -a A1:B2:C3:D4:E5:F6 -c wifi-user bssid wlan0. Here, -a is to define wifi bssid(mac address) and -c is for a user who is connected to the wifi. And -0 stands for deauth-attack(deauth-packets value is 3). Jun 04, 2020  WiFi Password Hacker App & Software For PC and Laptop 2020. The solution is to hack/break WiFi networks, which protected by a username and password. We can easily break up secure WiFi networks using hacking software such as “WiFi Password Hacker”. WiFi password hacking software lets you know which networks are available nearby and display them.

  1. The Wifi Network Requires A Wpa2 Password
  2. Wpa Wpa2 Password

Preparing to Hack Wi-Fi

  1. Understand when you can legally hack Wi-Fi. In most regions, the only time you can hack a WPA or WPA2 network is when the network either belongs to you or belongs to someone who has given you explicit consent to hack the network.
    • Hacking networks that don’t meet the above criteria isillegal, and may constitute a federal crime.
  2. Download the Kali Linux disk image. Kali Linux is the preferred tool for hacking WPA and WPA2. You can download the Kali Linux installation image (ISO) by doing the following:
    • Go to https://www.kali.org/downloads/ in your computer’s web browser.
    • Click HTTP next to the version of Kali you want to use.
    • Wait for the file to finish downloading.
  3. Attach a flash drive to your computer. You’ll need to use a flash drive with at least 4 gigabytes of space for this process.
  4. Make your flash drive bootable. This is necessary in order to be able to use the USB flash drive as an installation location.
    • You can also use a Mac for this step.
  5. Place the Kali Linux ISO file on the flash drive. Open the flash drive, then drag the downloaded Kali Linux ISO file into the flash drive’s window.
    • Make sure you leave your USB flash drive plugged in after you finish this process.
  6. Install Kali Linux. To install Kali Linux on your computer, do the following:
    • Prompt your Windows computer to restart.
    • Enter the BIOS menu.
    • Set your computer to start from your USB drive by finding the “Boot Options” (or similar) section, selecting your USB drive’s name, and moving it to the top of the list.
    • Save and exit, then wait for the Kali Linux installation window to appear (you may have to restart your computer one more time).
    • Follow the Kali Linux installation prompts.
  7. Buy a Wi-Fi card that supports monitoring. You can find Wi-Fi cards online or in tech department stores. Make sure that your Wi-Fi card allows monitoring (RFMON), or you won’t be able to hack a network.
    • Many computers have built-in RFMON Wi-Fi cards, so you might want to try the first four steps of the next part before buying one.
    • If you’re using Kali Linux in a virtual machine, you will need a Wi-Fi card regardless of your computer’s card.
  8. Log into your Kali Linux computer as root. Enter your root username and password when logging in.
    • You will need to be on your root account at all times during the hacking process.
  9. Plug your Wi-Fi card into your Kali Linux computer. Doing so will immediately prompt the card to begin setting up and downloading drivers for itself; if prompted, follow the on-screen instructions to complete the setup. Once you’re done with this step, you can proceed with hacking your selected network.
    • If you’ve already set up the card on your computer before, you’ll still have to set it up for Kali Linux here by plugging it in.
    • In most cases, simply attaching the card to your computer will be enough to set it up.

Part2 Hacking Wi-Fi

  1. Open your Kali Linux computer’s Terminal. Find and click the Terminal app icon, which resembles a black box with a white “>_” on it.
    • You can also just press Alt+Ctrl+T to open the Terminal.
  2. Enter the Aircrack-ng installation command. Type in the following command, then press ↵ Enter: sudoapt-get installaircrack-ng
  3. Enter your password when prompted. Type in the password you use to log into your computer, then press ↵ Enter. This enables root access for any other commands executed in Terminal.
    • If you open another Terminal window (as you may later in this article), you may have to run a command with the sudo prefix and/or enter your password again.
  4. Install Aircrack-ng. Press Y when prompted, then wait for the program to finish installing.
  5. Turn on airmon-ng. Type in the following command, then press ↵ Enter. airmon-ng
  6. Find the monitor name. You’ll find this in the “Interface” column.
    • If you’re hacking your own network, it will usually be named “wlan0”.
    • If you don’t see a monitor name, your Wi-Fi card doesn’t support monitoring.
  7. Begin monitoring the network. You can do so by typing in the following command and pressing ↵ Enter: airmon-ng start wlan0
    • Make sure you replace “wlan0” with the name of your target network if it’s different.
  8. Enable a monitor mode interface. Enter the following command: iwconfig
  9. Kill any processes that return errors. In some cases, your Wi-Fi card will conflict with running services on your computer. You can kill these processes by entering the following command: airmon-ng check kill
  10. Review the monitor interface name. In most cases, the name will be something like “mon0” or “wlan0mon”.
  11. Tell your computer to listen to nearby routers. To get a list of all routers in range, enter the following command: airodump-ng mon0
    • Make sure you replace “mon0” with whatever your monitor interface name was in the last step.
  12. Find the router you want to hack. At the end of each string of text, you’ll see a name; find the one belonging to the network you want to hack into.
  13. Make sure the router is using WPA or WPA2 security. If you see “WPA” or “WPA2” immediately to the left of the network’s name, you can proceed; otherwise, you cannot hack the network.
  14. Note the MAC address and channel number of the router. These pieces of information are to the left of the network’s name:
    • MAC address — This is the line of numbers on the far-left side of your router’s line.
    • Channel — This is the number (e.g., 0, 1, 2, etc.) directly to the left of the WPA or WPA2 tag.
  15. Monitor your selected network for a handshake. A “handshake” occurs when an item connects to a network (e.g., when your computer connects to a router). Enter the following code, making sure to replace the necessary components of the command with your network’s information: airodump-ng -c channel —bssid MAC -w /root/Desktop/ mon0
    • Replace “channel” with the channel number you found in the last step.
    • Replace “MAC” with the MAC address you found in the last step.
    • Remember to replace “mon0” with whatever your interface name was.
    • Here’s an example address: airodump-ng -c 3 —bssid 1C:1C:1E:C1:AB:C1 -w /root/Desktop/ wlan0mon
  16. Wait for a handshake to appear. Once you see a line with the tag “WPA handshake:” followed by a MAC address in the upper-right corner of the screen, you can proceed.
    • If you’re not in a waiting mood, you can force a handshake using a deauthattackbefore continuing with this part.
  17. Exit airodump-ng, then open the desktop. Press Ctrl+C to quit, then make sure you can see the “.cap” file on your computer’s desktop.
  18. Rename your “.cap” file. While not strictly necessary, this will make it easier to work with later. Enter the following command to change the name, making sure to replace “name” with whatever you want to name the file: mv ./-01.cap name.cap
    • If your “.cap” file isn’t named “-01.cap”, replace “-01.cap” with whatever your “.cap” file’s name is.
  19. Convert the “.cap” file into “.hccapx” format. You can do this by using Kali Linux’s converter. Enter the following command, making sure to replace “name” with your file’s name: cap2hccapx.bin name.cap name.hccapx
    • You can also go to https://hashcat.net/cap2hccapx/ and upload the “.cap” file to the converter by clicking Choose File and selecting your file. Once the file is uploaded, click Convert to convert it and then download it back onto your desktop before proceeding.
  20. Install naive-hashcat. This is the service you’ll use to crack the password. Enter the following commands in order: sudogit clone https://github.com/brannondorsey/naive-hashcat cd naive-hashcat curl -L -o dicts/rockyou.txt https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt
    • If your computer doesn’t have a GPU, you’ll need to use aircrack-ng instead.
  21. Run naive-hashcat. Once it finishes installing, enter the following command (making sure to replace any instance of “name” with your “.cap” file’s name): HASH_FILE=name.hccapx POT_FILE=name.pot HASH_TYPE=2500 ./naive-hashcat.sh
  22. Wait for the network password to be cracked. Once the password is cracked, its string will be added to the “name.pot” file found in the “naive-hashcat” directory; the word or phrase after the last colon in the string is the password.
    • It can take anywhere from a few hours to a few months for the password to be cracked.

Part 3 Using Aircrack-Ng for Non-GPU Computers

  1. Download a dictionary file. The most commonly used dictionary file is “Rock You”. You can download it by entering the following command: curl -L -o rockyou.txt https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt
    • Keep in mind that aircrack-ng will not be able to crack the WPA or WPA2 password if the password isn’t in the word list.
  2. Tell aircrack-ng to begin cracking the password. Enter the following command, making sure to use the necessary network information when doing so: aircrack-ng -a2 -b MAC -w rockyou.txt name.cap
    • If you’re cracking a WPA network instead of a WPA2 network, replace “-a2” with -a.
    • Replace “MAC” with the MAC address you found in the last section.
    • Replace “name” with your “.cap” file’s name.
  3. Wait for Terminal to display the results. When you see a “KEY FOUND!” heading appear, aircrack-ng has found the password. You’ll see the password displayed in brackets to the right of the “KEY FOUND!” heading.

Part 4 Using Deauth Attacks to Force a Handshake

  1. Understand what a deauth attack does.Deauth attacks send malicious deauthentication packets to the router you’re trying to break into, causing the Internet to disconnect and ask the Internet user to log back in. Once the user logs back in, you will be provided with a handshake.
  2. Monitor your network. Enter the following command, making sure to enter your network’s information where necessary: airodump-ng -c channel —bssid MAC
    • For example: airodump-ng -c 1 —bssid 9C:5C:8E:C9:AB:C0
  3. Wait for something to connect to the network. Once you see two MAC addresses appear next to each other (and a string of text that includes a manufacturer name next to them), you can proceed.
    • This indicates that a client (e.g., a computer) is now connected to the network.
  4. Open a new Terminal window. You can just press Alt+Ctrl+T to do this. Make sure airodump-ng is still running in the background Terminal window.
  5. Send the deauth packets. Enter the following command, making sure to substitute your network’s information: aireplay-ng -0 2 -a MAC1 -c MAC2 mon0
    • The “2” refers to the number of packets to send. You can increase or decrease this number, but keep in mind that sending more than two packets can cause a noticeable security breach.
    • Replace “MAC1” with the left-most MAC address at the bottom of the background Terminal window.
    • Replace “MAC2” with the right-most MAC address at the bottom of the background Terminal window.
    • Remember to replace “mon0” with your interface name that you found when your computer initially looked for routers.
    • An example command looks like this: aireplay-ng -0 3 -a 9C:5C:8E:C9:AB:C0 -c 64:BC:0C:48:97:F7 mon0
  6. Re-open the original Terminal window. Go back to the background Terminal window when you’re done sending the deauth packets.
  7. Look for a handshake. Once you see the “WPA handshake:” tag and the address next to it, you can proceed with hacking your network.

The Wifi Network Requires A Wpa2 Password

Source: WikiHow

5/5(4votes )

In this hi-tech life, we always need a working internet connection to manage both our professional and personal life. The most comfortable way to access internet everywhere anytime is by buying mobile data recharges but they are very expensive. Another good way to connect to free WiFi if it’s luckily available at your workplace, college or home. But everyone is not that lucky.

Everybody might have many fast WiFi hotspots available in their smartphone’s range, but they don’t have access to those WiFi connections because they are password protected and you don’t have access to them so, you can’t use those WiFi hotspot to access internet in your smartphone or laptop. But, what if you can hack a WiFi?

Yes, I am not joking. What if you can hack any WiFi available in your range and crack it’s password to access free and unlimited internet? IMO, if you can learn a way to hack a WiFi network then you can access free internet everywhere. Right?

So, I am telling you the method to hack a secured WiFi network, crack its password and enjoy free internet using it.

Before moving directly to the methods to hack WiFi networks lets first see what type of security and authentication methods are implemented in WiFi networks.

WiFi Security & Encryption Methods

  • Open – This is WiFi networks with no authentication. Anyone in the WiFi range can connect his device to the network without any password in enjoy free internet. However, these networks are rarely available and also risky.
  • WEP – Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN.
  • WPA – WiFi Protected Access (WPA) is improved and more secured security protocol which arrived with lots of improvements in encryption and authentication methods of WEP.
  • WPA2 PSK – It is short of Wi-Fi Protected Access 2 – Pre-Shared Key which is the latest and most powerful encryption method used in WiFi networks right now.

Hacking WiFi Networks with WEP, WPA and WPA2 PSK Security

As security features have been improved from WEP to WPA to WPA2 PSK WiFi authentication protocol, so obviously, WEP WiFi networks are very easy to hack compared to WPA and WPA2 PSK Security methods.

Almost every password-protected WiFi networks support both WPA/WPA2 PSK authentication. If somebody is already connected to the network, you can check in his network properties to see what encryption-type is being using by the targeted WiFi network.

But if you want to know encryption-type of WiFi network which is not connected to any device in your reach, you need Ubuntu operating system to do this.

In Ubuntu, you can use nmcli command in terminal which is command-line client for NetworkManager. It will show you security types of nearby Wi-Fi access points. Enter the following command in terminal:

It will show you the output like this:

Wpa Wpa2 Password

Using the above methods, you should have known the encryption-type of targeted WiFi network which you want to hack. So, I am gonna show you how to hack WiFi Network for each of WEP, WPA and WPA2 PSK secured WiFi networks.

Requirements for Hacking WiFi Netwoks

My methods require KALI Linux which is especially designed Linux distrbution for penetration testing and ethical hacking. You can download it for free from its official site. Download Kali Linux ISO from its website either install it as separate operating system in your system or you can use Virtual Machine/VMware to directly run KALI Linux inside Windows.

You will also need Aircrack-ng which is a security suite to assess WiFi network security. It focuses on different area of WiFi security: monitoring, attacking, testing and cracking.

Another important requirement is to check if your wireless card is compatible with Aircrack-ng or not. Because if it’s not compatible, you need to have an Aircrack-ng compatible card. Check it directly here: http://www.aircrack-ng.org/doku.php or run aireplay-ng -9 mon0 command inside terminal to view the percentage of injection your card can do.

Install Aircrack-ng using the following command in KALI LINUX

  • sudo apt-cache search aircrack-ng (to seach aircrack-ng or any related repositories)
  • sudo apt-get install aircrack-ng (to install aircrack-ng repository)

Fulfill only these requirements and you are ready to hack any WiFi network, whether it is a WEP, WPA or WPA2 PSK Wi-Fi.

Steps to hack WiFi Networks

Starting below, I’ll be guiding you step-by-step in hacking a secured WiFi network. You can either scroll down to read each and every WiFi hacking method or can directly jump to the required section below using these links:

There are various methods to hack into WiFi network and crack its password for all the above security-types but I am showing only those methods with which I’ve had success in cracking password of desired WiFi network and hack secured WiFi Access points. So, if you follow these steps correctly, you’ll also be able to hack any WiFi hotspot available in your reach.

How To Hack WEP WiFi Network

In this method, we are going to hack WEP secured WiFi network using packet injection method inside KALI Linux operating system. So, start KALI Linux in your system. Now follow these below steps:

Step 1: Check Wireless Interface

  • Open terminal in Kali Linux and enter the command airmon-ng. It will show you what network interface are you using. In my system, I have only one network interface card wlan0, which is my wireless interface card.
  • Create a network interface which runs in monitor mode. To do this enter command airmon-ng start wlan0.Make sure to replace wlan0 in command with the interface name that your card have. Here, mon0 has been created.
  • Now, you might or might not get the warning appearing in the below screenshot which tells other processes using the network which can create the problem. So, you can kill them using the syntax: kill PID if you know those processes are not important for you at the moment.

Step 2: Scan available WEP WiFi networks

Hack Wifi Password Mac Wpa2
  • Now, enter the command airodump-ng mon0 to scan & list down all the available WiFi networks using created monitor interface (mon0). It can take time to all the available WiFi networks in range.
  • Once the process is done,all the available WiFi access points will appear with their important details: BSSID (WiFi Access Point MAC Address), PWR (Signal strength value; the lower, the better), CH (Channel for WiFi), ENC (Encryption type), AUTH, ESSID (Name of WiFi)
  • Select the WiFi network with WEP Encryption (ENC) and lowest PWR value.

Step 3: Attack the selected WEP WiFi Network

  • Open another terminal concurrently and enter command: aidodump-ng -c 1 -w bell –bssid 64:0F:28:6B:A9:B1 mon0. Here, -c 1 indicates channel number which is 1, -w bell is to write data in file “bell”, –bssid 64:0F:28:6B:A9:B1 is MAC address for my selected WiFi access point and mon0 is monitor interface that was created above. Hit Enter and it will start sending packets (visible in #Data) to the WiFi
  • The speed of sending data is very slow but you need to escalate it by attacking the WEP WiFi network. First enter the command airplay-ng -1 0 -a 64:0F:28:6B:A9:B1 mon0 to perform fake authentication (-1 in command) to the network.
  • Now we will perform ARP REPLAY Attack to the WiFi network to climb the data to the network at enormous rate. Useairplay-ng -3 -b 64:0F:28:6B:A9:B1 mon0, where -3 is for ARP REPLAY attack. Hit enter and the command will start doing attack to WEP WiFi Access point and you can see the #Data value increasing at enormously fast rate.
  • In below screenshot the bell-01.cap is the file where data is being stored that we will use to crack the password of this WEP WiFi network once we have enough data (recommended #Data value should be over 35,000).
  • Once you have enough data in the file bell-01.cap, run the command aircrack-ng bell-01.cap. It will test all the data values available in key file and automatically show you the key it found by testing data in file.
  • You can see in above screenshot that we have successfully cracked the password of targeted WEP WiFi network
  • The key found will not be in those text or alphanumeric format that the WiFi owner has created. It will be in hex format but work just fine.
  • Now, to use this key, firstly start the processes you have killed in Step 1 above using the command I have used below.
  • Finally enter the cracked key 61:32:58:94:98 (without colon) as the password of targeted WEP WiFi Network and it will be connected.

Steps to Hack WPA/WPA2 Secured WiFi Network

Hacking into WPA/WPA2 WiFi Network is very tough, time & resource consuming. The technique used to crack WPA/WPA2 WiFi password is 4-way handshake for which there is a requirement to have at least one device connected to the network.

In WPA/WPA2 security method, the allowed password can have both large and small alphabets, numbers and symbols. And, allowed size of password is 64 characters. On a rough guess, if we consider password to be only 8 characters long and eliminate the use of symbols even then if you want to crack WPA or WPA2 WiFi password, using the brute force method the password combinations will be: 826+26+10=62 which is equals to:

  • 98079714615416886934934209737619787751599303819750539264

So, even in fastest computer you can manage to use, it’s going to take hours.

Aircrack-ng have all the tools required to crack into WPA/WPA2 PSK WiFi network. It can perform 4-way handshake by disconnecting/connecting the connected device and capturing WPA handshake. It can perform brute-force attack but you can’t hope to crack the password if you have wordlist/dictionary for the password (which is already too big in size) with password inside it. I hate to tell you this but yes, doing it on your own can take forever.

However, there is a tricky way to crack WPA/WPA2 WiFi Password quickly which only requires you to be a bit lucky. The tool is fluxion. Fluxion use same 4-way handshake technique to crack secured WPA/WPA2 WiFi access points password but it doesn’t require you to have dictionary or perform brute force attack. So yes, it’s going to minimize your time to hack WPA or WPA2 WiFi networks password multiple folds.

Instead of doing this, it performs a little bit of phishing where the already connected user is asked to enter password of WiFi network again for security reason and when the user enter the password, first the handshake is checked with the earlier captured handshake of the device, if handshake is correct that means the password entered by user is correct. Once it is successful, Fluxion returns the key required to authenticate the network.

Steps to crack WPA/WPA2 WiFi Password using Fluxion

Password
  • Scan the networks.
  • Capture a handshake (can’t be used without a valid handshake, it’s necessary to verify the password)
  • Use WEB Interface *
  • Launch a FakeAP instance to imitate the original access point
  • Spawns a MDK3 process, which deauthenticates all users connected to the target network, so they can be lured to connect to the FakeAP and enter the WPA password.
  • A fake DNS server is launched in order to capture all DNS requests and redirect them to the host running the script
  • A captive portal is launched in order to serve a page, which prompts the user to enter their WPA password
  • Each submitted password is verified by the handshake captured earlier
  • The attack will automatically terminate, as soon as a correct password is submitted

I can understand that not all readers will be able to implement the method after reading such summarized version on hacking WPA/WPA2 PSK WiFi Network. So, below is the video tutorial on cracking WPA2 WiFi Access Point password using Fluxion.

https://youtu.be/4XLUVfoJqo8

Comments below if you face any problem in hacking WEP, WPA and WPA2 PSK WiFi Networks using the above methods.

Must Read –How To Hack a Website using SQL Injection