Thursday 11 December 2014

How To Hack a WiFi (WEP Type)

1. Download the necessary programs.
You will need 2 programs to make this hack work: CommView (which will be used to look for vulnerabilities in the network you’re-trying to access[4]) and AirCrackNG (which will break the security key itself)
Make sure your computer’s wireless adaptor is compatible with CommView.

2. Find a Network. Use CommView to scan for wireless networks. Choose a network
with a WEP key and a decent signal.

3. Filter the search to that network. Right click on the network you want to access,
select “Copy MAC address”, go to the Rules tab, then MAC Addresses, enable MAC
address rules, then click Action→Capture→Add Record→Both. Paste in the MAC
address.

4. View Data packets. Sort out the Management (M) and Control (C ) packets so that
you are only viewing the Data (D) packets.

5. Save the packets. Go to the Logging tab and enable auto saving. You may need to
change the settings on the Directory size and File size. Try 2000 and 20, respectively

6. Press the “Play” button to begin collecting. Wait until you have at least 100,000
packets.

7. Click “Concatenate Logs” under the Log tab. Make sure all of the logs are
selected.

8. Export the logs. Go to the folder where the logs were saved and open the log file.
Click File→Export→WireShark/tcpdump format and save it where you can find it
easily.

9. Open the newly created file with Aircrack. Start Aircrack and choose WEP. Open
the file and click “Launch”.

10. Enter the index number. When the command prompt opens, you’ll need to enter
the index number for the target network. It is probably 1. Hit enter and wait. If it
works, the key will be shown.

Warnings :

  • When even writing a non-harmful script on computer, people will not trust you with their computer
  • Hacking a computer can have very serious consequences, especially if done on a public or school computer.
  • You will most likely be seen in court or go to jail for illegally accessing computers that don't belong to you.
  • Only use these techniques on your computer or on another person's computer with their permission.
  • This form of hacking will cause the victim to know someone has been in their computer. Beware, you can get caught easily.

No comments:

Post a Comment