Atlantis

Hack And Steal Wifi Password (Hack Any Wifi even Wpa2)

Recommended Posts

[hide]Step 1 : Make Sure You Have Everything

To prepare our evil twin access point attack, we'll need to be using Kali Linux or another supported distro. Quite a few distributions are supported, and you can check out the Airgeddon GitHub page for more about which Airgeddon will work with.

You can use a Raspberry Pi running Kali Linux for this with a wireless network adapter

 

Finally, you'll need a good wireless network adapter for this. In our tests, I found that the TP-Link WN722N v1 and Panda Wireless PAU07 cards performed well with these attacks. You can find more information On Google [ Search for best EXT Wifi Adapter for Hacking].

 

Step 2 - Install Airgeddon

To start using the Airgeddon wireless attack framework, we'll need to download Airgeddon and any needed programs. The developer also recommends downloading and installing a tool called CCZE to make the output easier to understand. You can do so by typing apt-get install ccze a terminal window. Next, we'll install Airgeddon, change directories, and start Airgeddon with the following commands.

git clone https://github.com/v1s1t0r1sh3r3/airgeddon

cd airgeddon

sudo bash ./airgeddon.sh

If you see the alien spaceship, you know you're ready to hack.

 

Step 3 - Configure Airgeddon

Press enter to check the various tools the Airgeddon framework relies on. If you're missing any, you can open a new terminal window and type apt-get install tool, substituting "tool" for the name of the missing tool. If that doesn't work, you can also try sudo pip install tool.

When you have all of the tools, proceed to the next step by pressing return. Otherwise, you may experience problems during your attack, especially if you are missing dnsspoof.

Next, the script will check for internet access so it can update itself if a newer version exists. When this is done, press enter to select the network adapter to use.

 

After we select our wireless network adapter, we'll proceed to the main attack menu.

Press 2 to put your wireless card into monitor mode. Next, select option 7 for the "Evil Twin attacks" menu, and you'll see the submenu for this attack module appear.

 

 

 

Step 4 - Select Target

Now that we're in our attack module, select option 9 for the "Evil Twin AP attack with a captive portal." We'll need to explore for targets, so press enter, and you'll see a window appear that shows a list of all detected networks. You'll need to wait for a little to populate a list of all the nearby networks.

 

 

Step 5 -Gather the Handshake

Now, we'll select the type of de-authentication attack we want to use to kick the user off their trusted network. I recommend the second option, "Deauth aireplay attack," but different attacks will work better depending on the network.

 

Press enter once you've made your selection, and you'll be asked if you'd like to enable DoS pursuit mode, which allows you to follow the AP if it moves to another channel. You can select yes (Y) or no (N) depending on your preference, and then press enter. Finally, you'll select N for using an interface with internet access. We won't need to for this attack, and it will make our attack more portable to not need an internet source.

 

 

 

Next, it will ask you if you want to spoof your MAC address during this attack. In this case, I chose N for "no."

 

Now, if we don't already have a handshake for this network, we'll have to capture one now. Be VERY careful not to accidentally select Y for "Do you already have a captured Handshake file?" if you do not actually have a handshake. There is no clear way to go back in the script without restarting if you make this mistake.

 

Since we don't yet have a handshake, type N for no, and press enter to begin capturing.

 

Once the capture process has started, a window with red text sending deauth packets and a window with white text listening for handshakes will open. You'll need to wait until you see "WPA Handshake:" and then the BSSID address of your targeted network. In the example below, we're still waiting for a handshake.

Once you see that you've got the handshake, you can exit out of the Capturing Handshakewindow. When the script asks you if you got the handshake, select Y, and save the handshake file. Next, select the location for you to write the stolen password to, and you're ready to go to the final step of configuring the phishing page.

 

Step 6 - Set the Phishing Page

In the last step before launching the attack, we'll set the language of the phishing page. The page provided by Airgeddon is pretty decent for testing out this style of attack. In this example, we'll select 1 for English. When you've made your selection, press enter, and the attack will begin with six windows opening to perform various functions of the attack simultaneously.

 

Step 7 - Capture Network Credentials

With the attack underway, the victim should be kicked off of their network and see our fake one as the only seemingly familiar option. Be patient, and pay attention to the network status in the top right window. This will tell you when a device joins the network, allowing you to see any password attempts they make when they're routed to the captive portal.

 

When the victim joins your network, you'll see a flurry of activity like in the picture below. In the top-right corner, you'll be able to see any failed password attempts, which are checked against the handshake we gathered. This will continue until the victim inputs the correct password, and all of their internet requests (seen in the green text box) will fail until they do so.

 

When the victim caves and finally enters the correct password, the windows will close except for the top-right window. The fake network will vanish, and the victim will be free to connect back to their trusted wireless network.

 

The credentials should be displayed in the top-right screen, and you should copy and paste the password into a file to save, in case the script doesn't save the file correctly. This sometimes happens, so make sure not to forget this step or you might lose the password you just captured.

 

After this, you can close the window, and close down the tool by pressing Ctrl + C. If we get a valid credential in this step, then our attack has worked, and we've got the Wi-Fi password by tricking the user into submitting it to our fake AP's phishing page![/hide]

I appreciate a like! 68747470733a2f2f637261636b65642e746f2f696d616765732f736d696c6965732f687970652e706e67

 

Leechers will get reported and banned! 68747470733a2f2f637261636b65642e746f2f696d616765732f736d696c6965732f6675636b796f752e706e67

  • Thanks 1

Share this post


Link to post
Share on other sites

thanks dude for this

Share this post


Link to post
Share on other sites

reallyyy wpaaa22??

Share this post


Link to post
Share on other sites

Thanks for sharing mate :)

Share this post


Link to post
Share on other sites

 

I appreciate a like! 68747470733a2f2f637261636b65642e746f2f696d616765732f736d696c6965732f687970652e706e67

 

Leechers will get reported and banned! 68747470733a2f2f637261636b65642e746f2f696d616765732f736d696c6965732f6675636b796f752e706e67

 

:fiesta: :fiesta:  looool mrc

Share this post


Link to post
Share on other sites

How does it work with WiFi adapter and Kali Linux on VM?

Share this post


Link to post
Share on other sites

xdddddddddddddddddddddd

Share this post


Link to post
Share on other sites

How does it work with WiFi adapter and Kali Linux on VM?

 

If I'm honest I have no Idea, but you can try it

Share this post


Link to post
Share on other sites

 

I appreciate a like! 68747470733a2f2f637261636b65642e746f2f696d616765732f736d696c6965732f687970652e706e67

 

Leechers will get reported and banned! 68747470733a2f2f637261636b65642e746f2f696d616765732f736d696c6965732f6675636b796f752e706e67

 

Hope its working if not report

Share this post


Link to post
Share on other sites

cant belive it .

Share this post


Link to post
Share on other sites

Upvoted, thank you

Share this post


Link to post
Share on other sites

Txxxxxxxxxxxx it!

Share this post


Link to post
Share on other sites

so what now

i will try

Share this post


Link to post
Share on other sites

THX bro 4 up. :)

Share this post


Link to post
Share on other sites

thanks friend I always give you I like your posts are at% 100

Share this post


Link to post
Share on other sites

 

I appreciate a like! 68747470733a2f2f637261636b65642e746f2f696d616765732f736d696c6965732f687970652e706e67

 

Leechers will get reported and banned! 68747470733a2f2f637261636b65642e746f2f696d616765732f736d696c6965732f6675636b796f752e706e67

 

thaaaaaaaaaaaaannnnnnnnnnnnnnnkkkkkkkkkkkkssssssssss

Share this post


Link to post
Share on other sites

Thank you for the share

Share this post


Link to post
Share on other sites

nice bro. i will see if this work for me . thx bro

Share this post


Link to post
Share on other sites

Wpa2 is it possible??? Omg

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.