Skip to main content

Hack Wireless Network using Airgeddon





Hack Wireless Network using Airgeddon




Airgeddon is a multi-use bash script for Linux systems to audit wireless networks.
Features
  • Interface mode switcher (Monitor-Managed).
  • DoS over wireless networks with different methods.
  • Assisted Handshake file capture.
  • Cleaning and optimizing Handshake captured files.
  • Offline password decrypt on WPA/WPA2 captured files (dictionary and bruteforce).
  • Compatibility with many Linux distros (see requirements section).
  • Easy targeting and selection in every section.
  • Controlled Exit. Cleaning tasks and temp files. Option to keep monitor mode if desired.
  • Multilanguage support and autodetect OS language feature (see supported languages section).
  • Help hints in every zone/menu for easy use.
  • Auto-update. Script checks for newer version if possible.
First of all clone  airgeddon from git by executing the following command on the terminal:
git clone https://github.com/v1s1t0r1sh3r3/airgeddon.git
Now to launch airgeddon enter the cloned folder and execute command:
./airgeddon.sh
After execution it will take some time to check if all the tools are installed  and then press Enter when asked.
Now it will ask you to select an interface .Select  wlan0  for wifi attacks as in my case I have selected 2.
After selecting wlan0 it will give many other options to choose .You have to select option 2 to enter into the monitor mode which puts the wlan0 interface in monitor mode to listen to all the available wifi connections  and then pressENTER key to continue further.
Now  again it will give some new options and you have to select option 5 to enter Handshake tools menu.
Now it will present you with more options  , now select option 5 to start capturing handshake and press ENTERwhen asked .Then it will again ask you to press ENTER for selecting the target so press ENTER. 
Now it will open a new window showing you the list of available targets  .Wait till your target wifi appears and then  hit ctrl^c.
Now it will show you the available target list, so select your target by entering the id  NO. given in the N column.  I have selected the network Tenda_3  by entering  6.After that press ENTER to continue.
Now it will ask to choose the attack type so select  2 for Deauth  aireplay attack which will first use deauth attack to disconnect all the client and then capture the handshake between the router and the client .Again  press ENTER to continue which will open two windows. 
As you can see below  two windows will open ,one is deauth attack window and otrher is capturing handshake .You have to wait till the WPA Handshake appears on the top right side of the window and then hit ctrl^c.
Then it will ask if you get the handshake ,so press y for YES and then it will ask the path of the capture file which is default set to the last capture so just press ENTER .
 Now you have to return to the main menu by pressing  7
Now you have to crack the password by selecting the 6 option.
Now it will ask to select a attack for breaking the password ,we will select dictionary attack to use a dictionary  and then it will  ask if you want to use already selected  BSSID so press  y and then it will ask to use the already selected BSSID so press y and it will again ask the path of dictionary file .Here you can give your custom made dictionary or default dictionary present in the kali .I have used password.lst in the  /usr/share/nmap/nselib/data/passwords.lstand then press ENTER key to continue.
Now it will start cracking with aircrack-ng and if the password is present in the dictionary it will show you the password  as you can see that KEY FOUND[87654321].

Comments

Popular posts from this blog

Find Identifying Information from a Phone Number Using OSINT Tools

Find Identifying Information from a Phone Number Using OSINT Tools Phone numbers often contain clues to the owner's identity and can bring up a lot of data during an OSINT investigation. Starting with a phone number, we can search through a large number of online databases with only a few clicks to discover information about a phone number. It can include the carrier, the owner's name and address, and even connected online accounts. While a phone number may not seem like much information to give out, an OSINT researcher can quickly discover information that ties a phone number to a variety of other clues. The data can be used to detect whether a phone number is a throwaway VoIP number used to hide the owner's identity or a cell phone belonging to a real person. In the event of buying something online or replying to an apartment ad,...

Difference Between POP3 and IMAP

Difference Between POP3 and IMAP POP3 and IMAP are the protocols that are used to retrieve mail from the mailbox at the mail server to the recipient’s computer. Both are message accessing agents (MAA). The two protocols POP3 and IMAP are used when both the sender and recipient of mail are connected to the mail server by WAN or LAN .  SMTP protocol transfers the mail from client’s computer to the mail server and from one mail server to another mail server.POP3 has a limited functionality whereas, the IMAP has extra features over POP3. The basic difference between POP3 and IMAP is that using POP3 ; the user has to download the email before checking its content whereas, the user can partially check the content of mail before downloading it, using IMAP . Let us check out some more differences between POP and IMAP with the help of comparison chart. Content: POP3 Vs IMAP Comparison Chart Definition Key Differences Conclusion Comparison Chart Basis for Comparison POP...

How to use hping3 in kali Linux(Performing dos attack)

How to use hping3 in kali Linux (Performing dos attack) What is hping3 hping3 is a network tool able to send custom TCP/IP packets and to dis‐ play target replies like ping program does with ICMP replies. hping3 handle fragmentation, arbitrary packets body and size and can be used in order to transfer files encapsulated under supported protocols. Hping3 is extremely powerful you can do following things with hping3 Test firewall rules Advanced port scanning Test net performance using different protocols, packet size, TOS (type of service) and fragmentation. Path MTU discovery Transferring files between even really fascist firewall rules. Traceroute-like under different protocols. Firewalk-like usage. What is dos Attack Dos stands for denial of service. Dos attack shuts down Webservers/systems and completely makes them inaccessible to users. Dos attack floods target network with excess ...