Assessing WiFi Security using Airodump-ng and Aircrack-ng

Published on . Written by

Assessing WiFi Security using Airodump-ng and Aircrack-ng

Introduction


Skyfi Labs Projects
Nowadays it is very important to secure our data from many of the cyber attacks. Cyber Security is the field in which you will learn about cyber attacks and how to prevent such attacks. The information provided in this article is only for educational purposes. It should not be used for illegal activities. The information only deals with how you can secure your WiFi with a strong password. Skyfi Labs always helps you to learn more and more technologies. Stay tuned with us for more information.

Read more..

SLNOTE
Project Description

This project is for the security purpose that no one can use your wifi data without the owner’s permission. This project deals with how to check the security of WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat. The ethical hacking project describes the whole thing about how to check the password of WiFi is weak or strong or how to crack wifi password which is weak. It helps to test your network security or any of your neighbors. Please do not use this for illegal purposes. For such an activity company and the author is not responsible. It is a humble Warning to all of you. 

Implementation methods/commands

  1. You must be a comfortable user of the command line.
  2. Prefer Kali Linux Operating System for the project.
  3. Install Aircrack-ng with command.
  4. You must have a wireless card that supports monitor mode.
  5. Initially check that your wireless interface name is wlan0. it’s not then correct the name.
  6. After that run iwconfig for a new monitor mode interface.
  7. Then the next step is to find out your WiFi router using a monitor interface. It will display MAC id and channel number on your monitor. We need both of them for further activity.
  8. We know that WPA/WPA2 uses a 4-way handshake for the authentication of devices to the network.
  9. When it is done with a handshake then it will display a WPA handshake. 
  10. Once you have captured a handshake then you can quit by using ctrl + c.
  11. Save .cap file which will be used for the checking of whether the password is strong or weak.
  12. The final step is to find the password by the captured handshaking. You can use a hashcat for password cracking. For that you must have access to GPU, if you can't access GPU then you can handle it by using GPUHASH.me
  13. While using naive-hashcat you have to convert .cap file to .hccapx file. 
  14. Then download and run naive-hashcat.
  15. Then download required dictionaries like rockyou.
  16. The cracked password will save in .pot file e.g. hackme.pot etc
  17. The network name and password are separated by (:).
  18. If you got the password then change the password with a strong one.(apply it only for your personal wifi router)
  19. You are done with your experimental security project steps
I will again warn you that the article is only for the security check purpose. It has no intentions other than educational knowledge. Do not try for illegal use. If you do so, the author and company are not responsible for that.


SLLATEST
Benefits of the experiment

You can understand network security.

Protect your WiFi router with a strong password.

Awareness about cyber attacks


SLDYK
Kit required to develop Assessing WiFi Security using Airodump-ng and Aircrack-ng:
Technologies you will learn by working on Assessing WiFi Security using Airodump-ng and Aircrack-ng:


Any Questions?