Sign in to follow this  
Marick

Hack WPA & WPA2 Wi-Fi | Using Airgeddon

Recommended Posts

How to hack your Neighbour-101

Please be considerate with this lil' mofo of a guide I put out for you folks.

 

 

 

[hide][spoiler=Step 1]

 

Step 1

Download Airgeddon

 

First, you'll need to install Airgeddon by cloning the git repository.

Open a terminal window, and type the following to clone the repo, change directory to the new folder, and run "airgeddon.sh" as a bash script.

 

 

git clone github.com/v1s1t0r1sh3r3/airgeddon.git

cd airgeddon

sudo bash ./airgeddon.sh

 

 

If it works, you should see an alien loading screen. Don't get too spooked, the script will start soon.

 

hack-wpa-wpa2-wi-fi-passwords-with-pixie-dust-attack-using-airgeddon.w1456.jpg

 

 

 

[spoiler=Step 2]

Step 2

 

Airgeddon will detect your OS and terminal resolution. Press return to check on all the tools contained in the framework.

 

hack-wpa-wpa2-wi-fi-passwords-with-pixie-dust-attack-using-airgeddon.w1456.jpg

 

Airgeddon will do a check to see what essential tools are installed. You should try to make sure you have a completely green board before you begin, but in particular, you will need Bully for this attack.

To install a missing repo, you have a number of options. The easiest is to follow the format below.

 

apt-get install (whatever you are missing)

 

If that doesn't work, you can also try using Python pip to install Python modules by typing pip3 install nameofwhatyouaremissing into a terminal window.

When all the results are a green "Ok," press return to proceed to the adapter selection.

 

hack-wpa-wpa2-wi-fi-passwords-with-pixie-dust-attack-using-airgeddon.w1456.jpg

 

 

 

 

[spoiler=Step 3]

In the next step, Airgeddon will list your network adapters. Select the one you wish to use for the attack by typing the number next to it.

You may want to change the MAC address of your adapter with a tool like GNU MAC Changer before doing this.

In this case, I am selecting my dual-band 2.4 and 5 GHz network card, which is option 3.

 

hack-wpa-wpa2-wi-fi-passwords-with-pixie-dust-attack-using-airgeddon.w1456.jpg

 

Next, you will be dropped into the main attack screen. In this case, I will be performing a WPS attack, so I will select option 8 and press return.

 

hack-wpa-wpa2-wi-fi-passwords-with-pixie-dust-attack-using-airgeddon.w1456.jpg

 

 

 

[spoiler=Step 4]

Now, you will need to put your card into monitor mode. Rather than the usual airmon-ng commands, simply type the number 2 into the menu, and press return.

 

hack-wpa-wpa2-wi-fi-passwords-with-pixie-dust-attack-using-airgeddon.w1456.jpg

 

If all goes well, your card should be put into monitor mode and change its name.

Airgeddon will keep track of the changed name, and you will be able to proceed to the targeting menu.

 

 

 

[spoiler=Step 5]

To find vulnerable routers, you can now turn your card to the networks in the immediate area by selecting option 4, scan for targets. I

f you have a dual-band card, you will be asked if you want to scan the 2.4 or 5 GHz spectrum, allowing you to decide what kind of networks to target. Type Y for 5 GHz and N for 2.4 GHz.

 

 

hack-wpa-wpa2-wi-fi-passwords-with-pixie-dust-attack-using-airgeddon.w1456.jpg

 

A window should open showing you all of the vulnerable networks. Allow it to stay open for a few scans while your card runs up and down the wireless channels and tries to find new networks.

After waiting for about a minute, exit out of the window, or hit Ctrl + C.

 

hack-wpa-wpa2-wi-fi-passwords-with-pixie-dust-attack-using-airgeddon.w1456.jpg

 

You should see your Wi-Fi target data loaded into a selector screen, meaning you're ready to load target data into an attack module!

 

 

 

[spoiler=Step 6]

Now, you should see a screen which contains target data for each vulnerable network you detected. T

ype the number of the network you want to target to pass the targeting data to Airgeddon, and press return.

Next, you will select which attack module will use these values as an argument.

 

hack-wpa-wpa2-wi-fi-passwords-with-pixie-dust-attack-using-airgeddon.w1456.jpg

 

594x299https://img.wonderhowto.com/img/55/18/63657019881663/0/hack-wpa-wpa2-wi-fi-passwords-with-pixie-dust-attack-using-airgeddon.w1456.jpg[/img]

 

In my example, my WPS attack screen is now fully live and ready to fire.

My wireless card is in monitor mode, and I have selected a network by BSSID, channel number, ESSID, and other information I pulled from my scan. Now, all I need to do is select an attack module.

 

As you can see below, quite a few are offered. Depending on your wireless card, you will have more luck with either Reaver or Bully.

In this lil' guide, we're focusing on Bully, so type 7 to load the target data into the Bully attack module, and press return.

 

hack-wpa-wpa2-wi-fi-passwords-with-pixie-dust-attack-using-airgeddon.w1456.jpg

 

The final value you will need to input is the timeout, or how long before the program assumes the attack has failed.

For now, set the value to around 55 seconds. Press return, and the attack will begin.

 

hack-wpa-wpa2-wi-fi-passwords-with-pixie-dust-attack-using-airgeddon.w1456.jpg

 

 

 

[spoiler=Step 7]

Once you start the attack module, a window will open with red text on the screen.

If communication is successful, you will see many encrypted transactions like the one in the image below. If you are out of range or the target isn't really vulnerable, you will see failed transactions.

 

As soon as Bully has the needed data to break the PIN, it will pass it to the WPS Pixie-Dust program.

 

hack-wpa-wpa2-wi-fi-passwords-with-pixie-dust-attack-using-airgeddon.w1456.jpg

 

 

This can happen in a matter of seconds or less, but if your connection is weak, it may take as long as a few minutes. You should see the cracked PIN and the Wi-Fi password appear at the bottom of the screen.

That's it! You have complete access to the router.

If you write down the PIN, you can use the "custom PIN association" module to be able to get the new password any time it's changed until the target buys a new router or disables WPS.

This also works if you just got the PIN but didn't get the router to dump the Wi-Fi credentials.

 

hack-wpa-wpa2-wi-fi-passwords-with-pixie-dust-attack-using-airgeddon.w1456.jpg

 

 

[/hide]

 

Show some love by liking dis

Share this post


Link to post
Share on other sites

let me see if it works

Share this post


Link to post
Share on other sites

you cannot hack WPA easily so you gay gay and nice nice like @Zombie

Share this post


Link to post
Share on other sites

d0es this include brutef0rcing

Share this post


Link to post
Share on other sites

d0es this include brutef0rcing

 

Sorry for the late reply. Well that depends on how you would approach, but usually yes it will bruteforce in a way that I won't describe since it would require a shit ton of pages of explanation.

But in the end the WPS Pixie-Dust program does somewhat a bruteforce through the WPA/WPA-2 after the monitor mode :)

 

I hope I answered your question, otherwise feel free to PM me :)

Share this post


Link to post
Share on other sites

How to hack your Neighbour-101

Please be considerate with this lil' mofo of a guide I put out for you folks.

 

 

 

 

 

Show some love by liking dis

i'll try this thanks

Share this post


Link to post
Share on other sites

Thank you! Will test it out!

Share this post


Link to post
Share on other sites

How to hack your Neighbour-101

Please be considerate with this lil' mofo of a guide I put out for you folks.

 

 

 

 

 

Show some love by liking dis

 

 

How to hack your Neighbour-101

Please be considerate with this lil' mofo of a guide I put out for you folks.

 

 

 

 

 

Show some love by liking dis

Share this post


Link to post
Share on other sites

Wow ! love it

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Sign in to follow this