Hacking Articles is an article/guides about basic hacking and any topics related to Hacking/Technology.
This was written by Rovic Balingbing a.k.a. Baby Esue, it consists of 30 parts, this "Hacking Articles" consists of some articles, guides, tutor...
[Disclaimer: The content of this article is for educational purposes only. It was written to help readers test their skills on using computers and/or Kali Linux and share knowledge about Kali Linux to the users. The writer of this article/guide take no responsibility for actions resulting from the inappropriate usage of informations contained of this article/guide.]
Andito na tayo guys, Part 18 na hehe, medyo malayo-layo na ang ating nararating. In this discussion I will be discussing some WiFi crackers that we will see and use in Kali Linux. Lets Get it on!
Fern Wifi Cracker
-is one of the tools that Kali has to crack wireless.
Before opening Fern, we should turn the wireless card into monitoring mode. To do this, type "airmon-ng start wlan-0" in the terminal.
Now, open the Fern Wireless Cracker.
Step 1. go to Applications -> Click "Wireless Attacks" -> "Fern Wireless Cracker"
Step 2. Select the Wireless card as shown in the following screenshot.
Oops! This image does not follow our content guidelines. To continue publishing, please remove it or upload a different image.
Step 3: Click "Scan for Access Points".
Step 4: After finishing the scan, it will show all the wireless networks found. In this case, only "WPA networks" was found.
Step 5: Click WPA networks. It shows all the wireless found. Generally, in WPA networks, it performs Dictionary attacks as such.
Step 6: Click "Browse" and find the wordlist to use for attack.
Step 7: Click "Wifi Attack".
Step 8: After finishing the dictionary attack, it found the password.
Kismet
-is a WIFI network analyzing tool.It is a 802.11 layer-2 wireless network detector, sniffer, and intrusion detection system. It will work with any wireless card that supports raw monitoring (rfmon) mode,and can sniff 802.11a/b/g/n traffic. It identifies the networks by collecting packets and also hidden networks.
Para gamitin ito, gawing monitoring mode ang wireless card sa pamamagitan ng pagtype ng "airmon-ng start wlan-0" sa terminal.
At pwede na nating simulan ang paggamit ng tool na ito:
Step 1: To launch it, buksan ang terminal at itype ang "kismet".
Step 2: Click "OK"
Step 3: Click "Yes" kapag nagtanong ito na Buksan ang server ng Kismet. Kapag No ang pinindot mo, ito ay hihinto.
Step 4: In Startup options, Leave it as default and click "Start"
Step 5: magapakita ito ng isang table at itatanong kung ito ba yung wireless card. Then click "Yes"
Step 6: In this case, the wireless source is "wlan0". ito ay ilalagay mo sa "Intf" section then click "Add"
Step 7: It will start sniffing the wifi networks.
Step 8: Click on any network, it produces the wireless details.
GISKismet
-is a wireless visualization tool to represent data gathered using Kismet in a practical way. It stores information in a database so we can query data and generate graphs using SQL.
- it usually uses SQLite for the database and GoogleEarth/ KML files for graphing.
So paano ba ito gamitin?
Step 1: Para mabuksan ang GISKismet, pumunta lang sa : Applications -> Click "Wireless Attacks" -> giskismet.
Kung natatandaan nyo sa kaninag tool, gumamit tayo ng Kismet para magexplore ng data tungkol sa wireless networks at lahat ng data ng Kismet ay nalalagay sa netXML files.
Step 2: Para maimport ang file sa Giskismet, type "root@kali: ~# giskismet -x Kismet-filename.netxml" at magsisimula na itong mag import ng mga files.
Pagkatapos maimport, pwede na natin itong maimport sa Google Earth yung mga hotspots na nakita natin.
Step 3: Assume na mayroon na tayong nainstall na Google Earth, Click File -> Open File that Giskismet created -> Click "Open"
Then, lalabas ang map na tulad nito.
Oops! This image does not follow our content guidelines. To continue publishing, please remove it or upload a different image.
Ghost Phisher
-is a popular tool that helps to create fake wireless access points and then later to create Man-in-The-Middle-Attack.
Step 1: To open it, click Applications -> Wireless Attacks -> "ghost phishing".
Step 2: After opening it, we will set up the fake AP using the following details.
Wireless Interface Input: wlan0
SSID: wireless AP name
IP address: IP that the AP will have
WAP: Password that will have this SSID to connect
Step 3: Click the Start button.
Wifite
-It is another wireless clacking tool, which attacks multiple WEP, WPA, and WPS encrypted networks in a row.
Firstly, the wireless card has to be in the monitoring mode.
Step 1: To open it, go to Applications ->Wireless Attack -> Wifite.
Step 2: Type "wifite –showb" to scan for the networks.
Step 3: To start attacking the wireless networks, click Ctrl + C.
Step 4: Type "1" to crack the first wireless.
Step 5: After attacking is complete, the key will be found.