Preview

Wifi Password

Satisfactory Essays
Open Document
Open Document
344 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Wifi Password
Cracking WEP/WPA/WPA2/WPS using Fern-Wifi-Cracker

NOTE:
This tutorial is for educational purposes only. Do not use this to harm or damage other’s computer.

Tested only with Backtrack 5 r3.

Requirements :
• Backtrack 5 r3 LiveCD or ISO - (download here)

Update: Ito po yung ginamit kong backtrack

• VMware (I used Oracle VM VirtualBox)
Wireless Network Adapter (I used RT73USB Wireless Network Adapter)

In this tutorial, I already have Backtrack 5r3 installed in VMware/VirtualBox. So I will assume that you have done that too or you can just boot using LiveCD. Make a little research if you don’t know how to install Backtrack into VMware/VirtualBox.

This method is just a simplified version of the most popular cracking tools like aircrack-ng and reaver.
Frequently asked questions

Q: Is My Wireless Card Compatible?
A: For working and compatible list of network adapters, visit http://www.aircrack-ng.org/doku.php?id=compatible_cards

Q: Pwede po sa WPA/WPA2 with or without WPS ?
A: Yes... pwedeng pwede po... yung example ko po dyan sa screenshots is WPA2 w/out WPS...
It is my own wifi using B200W modem.
Ok, Let’s start…

1. Open fern-wifi-cracker.
Click Applications> Exploitation Tools> Wireless Exploitation Tools> WLAN Exploitation> Fern-wifi-cracker |

2. Getting update needs internet connection. I recommend you to get the latest update, because in my experience it can’t capture the clients connected to the Access Point (Target) and it works only after getting the update.
Restart Fern Wifi Cracker after getting the update.

3. Follow the image below.
a. Select your interface card, mine is wlan0.
b. Scan for access points
c. If access point is found, WEP or WPA button will be enabled. My access point is using WPA, let’s proceed.

4. After clicking WPA button, a window will appear. It shows the detected access points and its details.
- Select your target access point
- Select an attack option. In this tutorial, I used

You May Also Find These Documents Helpful

  • Good Essays

    Lkt2 - Task 3

    • 871 Words
    • 4 Pages

    Wireless support is currently only available at the site A. An access point will be need…

    • 871 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Before beginning the labs, set up the wireless network just as you did last week. Remember: You will need to configure the routers for every lab period for every lab meeting. Use the same settings you used last week (if they differ from the worksheet) and the same router/network you assigned to each student. Remind…

    • 411 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    nt1210 lab 7.1-3

    • 420 Words
    • 3 Pages

    2. It’s because the signal still has to be able to be picked up by the AP it would have to depend on the router to pick up the signal…

    • 420 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 4

    • 3225 Words
    • 13 Pages

    The first step in collecting RF information is to position the access point in what may appear to be the most logical location.…

    • 3225 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1210 U6 Lab

    • 447 Words
    • 2 Pages

    The information that it’s giving me is that its showing the wireless networks around my area. A security key.…

    • 447 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    b. Devices will only operate at a limited distance from an access point, with the distance determined by the standard used and buildings and other obstacles between the access point and the user.…

    • 807 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 8 Questions

    • 306 Words
    • 1 Page

    2. To prevent outsiders from exploiting connected resources and sniffing data that is being transmitted. The best encryption method is WPA2.…

    • 306 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    This article gives a high level overview into the 802.11ac wireless standard. 802.11ac is also referred to as “gigabit Wi-Fi” and will be capable of significantly faster data transfer speeds than the current 802.11n. This article includes information on frequency, channels, spatial streams, beam forming and backwards compatibility. PC World is an internationally renowned computer magazine that is published monthly in print and digital form. PC World was established in 1983. The company offers advice, recommendations and information on a wide variety of technological hardware and software. The information in this article shares content that is relevant to the main points of the thesis statement (Bradley, 2012).…

    • 1693 Words
    • 7 Pages
    Good Essays
  • Good Essays

    When connecting to a private and secured wireless access point, you must provide the information that proves you have the right to use the network. true…

    • 602 Words
    • 3 Pages
    Good Essays
  • Good Essays

    You are also able to perform detective work with the help of router and will identify the devices and if you want you are able to find the settings of ‘Hide a network’ and your neighbors are unable to scan your connection and every time you connect the device you should need to enter the SSID manually.…

    • 367 Words
    • 2 Pages
    Good Essays
  • Good Essays

    A VPN works well for industries in which the interception of data could give a competitor an unfair advantage. For example, a VPN would be necessary for telecommuting employees who send proprietary data from their home computer to the network at the office,. Perhaps a good place for a VPN would be in a health-care environment, where it is essential that small amounts of data gets point to point without being intercepted and understood by a hacker. There could be many uses where data needs to get point to point with its integrity intact and viewed only by authorized personnel. Law-enforcement agencies, credit card companies, and the military may have numerous applications for VPNs.…

    • 11068 Words
    • 45 Pages
    Good Essays
  • Satisfactory Essays

    Athlete Shack Proposal

    • 863 Words
    • 4 Pages

    The Athlete’s Shack (TAS) is a company with ten stores in their chain of sporting goods stores. Due to increased popularity the business is growing and in need of a method of keeping all the stores connected. To resolve this issue they have decided to implement a wireless network that would connect all ten of their stores together. Of course there will be one location that will be the main location that links all the stores together and this will help them to manage their business by allowing them to keep track of sales and inventory. Along with connecting all the stores together TAS is also looking to implement wireless access points throughout the individual stores. This will allow employees at the stores that will be giving IPads to better serve the customers and complete their daily tasks at the store.…

    • 863 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Study Guide

    • 1194 Words
    • 5 Pages

    9. What is the frequency range used by 802.11a, and what modulation technique is used?…

    • 1194 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Application Requirements

    • 274 Words
    • 2 Pages

    |Two current applications of WLANs |Used in Home networks and businesses. Supports wireless printing |…

    • 274 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 7 assignment 1

    • 547 Words
    • 2 Pages

    WLANs (wireless local area networks) are becoming increasingly prevalent, not only in schools, but in many businesses and establishments. They can provide a plethora of benefits within a school environment including flexibility, speed, and resource mobility. A WLAN would assist in ease of use, and make many of the day-to-day functions of school employees easier.…

    • 547 Words
    • 2 Pages
    Satisfactory Essays