Today We are performing Attack on Wireless Networks It’s Called Wifi.

So using this trick you can able to hack anyone’s wifi easily.

So without time wasting we are playing this Attack.

For this Attack, We are using Wifite Tool

if you want to know what logics and concepts are working in this attack you can read theory parts and others who does not intrested in theory so that users go to direct practical part.

Theory :

In this attack,
we are using wireless interface so we can recieve wireless wifi signals and by default our wireless NIC chip works on Managed mode.

So our 1st step is go to Managed mode to Monitor Mode because we are monitoring all network packets and signals for password cracking that’s why we enable Monitor mode.


  airmon-ng wlan0

now our monitor mode is enabled. for double verification you can check it using iwconfig command.

our 2nd step is finding our nearest wifi signals

our 3rd step is target any one wifi

our 4th step is performing Deauthentication Attack on Wifi,
We are explaining Deauthentication Attack using one example,
suppose

you have an one mobile phone and one laptop both are connected via same wifi so you are performing deauth. attack on wifi using laptop, so that time your mobile phone was disconnected to wifi for 3 or 4 seconds and after 4 seconds your mobile is connecting to your wifi between this process our laptop listen wifi network packets that are sent by mobile and recieve by wifi router. In this packets one most important value is available that’s called Handshake . In Handshake password was stored in encrypted format.

so after deauthentication attack we are havinf wifi password’s encrypted value

now we are performing only one step it’s called password brute force.

In password Brute force , we have one password list in which millions of passwords are available. next tool use one password and match with encrypted value if match then its our password or else don’t match then try second password , third password ….. this process are running till the password are match.

So this is the method ( theory ) of the attack Now it’s a practical time.

Categorized in:

Attacks,