SlideShare a Scribd company logo
1 of 26
WIFI HACKINGTHE IN DEPTH STORY OF WHAT ARE WE HACKING
Guided by:- Mrs. Hemangini Patel
Presented by:- Mehul Jariwala
Contents
1. Terminologies in WLAN.
2. Encryption in Wi-Fi
WEP
WPA
WPA2
3. Encryption Algorithm Works.
4. Tools For Hacking.
5. History of Kali Linux.
6. Feature of Kali Linux.
7. Steps to Hack Wi-Fi with Kali Linux.
Terminologies in WLAN
 IEEE 802.11:- It is a set of media access control (MAC) and physical
layer (PHY) specifications for implementing wireless local area
network (WLAN).
 3 Way Handshake:- It’s a cryptographic message exchange between
the AP and The client which authenticates the client to connect to the AP.
 Access Point (AP):- An access point is a device, such as a wireless router,
that allows wireless devices to connect to a network
 SSID (Service Set Identity):- It is also known as the "wireless network
name", the SSID is a 32 character, case sensitive name given to a Basic
Service Set established by an access point.
Encryption in Wi-Fi
1. Wired Equivalent Privacy (WEP)
 IT is an easily broken security algorithm for IEEE 802.11.
 WEP is the older form of encryption developed around
1997.
 WEP, recognizable by the key of 10 or 26 hexadecimal digits.
 Once this measure has been taken, other typical LAN
security mechanisms such as password protection, end-to-
end encryption, virtual private networks (VPNs),
and authentication can be put in place to ensure privacy.
Encryption in Wi-Fi
2. Wi-Fi protected access(WPA)
 It was formally adopted in 2003, a year before WEP was
officially retired.
 A 128-bit WEP key is usually entered as a string of 26
hexadecimal characters.
 Attacker had captured or altered packets passed between
the access point and client and the Temporal Key Integrity
Protocol (TKIP).
 TKIP employs a per-packet key system that was radically
more secure than fixed key used in the WEP system.
Encryption in Wi-Fi
3. Wi-Fi Protected Access II (WPA2)
 One of the most significant changes between WPA and
WPA2 was the mandatory use of AES[Advance Encryption
Standard] algorithms.
 WPA2 uses 256 bit AES algorithms for encryption which
makes it much more secure than the ones before it.
 Although breaking into a WPA/WPA2 secured network
using this vulnerability requires anywhere from 5-14 hours
of sustained effort with a modern computer and not be
sure to hack the Successfully.
Encryption Algorithm Works:-
Tools For WI-FI Hacking
 Air crack:- Air crack is the most popular and widely-known
wireless password cracking tools.
 Air Snort:- Air Snort is another popular wireless LAN password
cracking tool.
 Kismet:- Kismet is network sniffer and intrusion detection system.
 Air jack:- Air jack is a Wi-Fi 802.11 packet injection tool.
 Net Stumble:- Net Stumble is another wireless password cracking
tool available only for Windows platform.
 Cloud Cracker :- Cloud Cracker is the online password
cracking tool for cracking WPA protected wi-fi networks.
 Wep Crack:- Cracking WEP
History of Kali Linux
 Kali Linux is a Debi an-based Linux distribution aimed at
advanced Penetration Testing and Security Auditing. Kali
contains several hundred tools aimed at various Information
Security tasks, such as Penetration Testing, Forensics and
Reverse Engineering.
 Kali Linux is Developed, Funded and Maintained by Offensive
Security, a leading information security training company.
 Kali Linux was released on the 13th March, 2013 as a
complete rebuild of Backtrack Linux.
 Kali Linux is Named after a Hindu goddess.
Developers of Kali Linux
Features of KALI LINUX
 Open Source.
 Developed in a secure environment.
 Available in 32-bit and 64-bit images.
 It’s first version of Kali 1.0 was Released on 13th March, 2013.
 It’s newest version Kali 2.0 was released on 11th August, 2015.
 Multi Language Support.
 Rewritten to use Debian standards.
 300+ pentesting applications.
 Users can customize Kali Linux to suit their needs.
Steps for Wi-Fi Hacking
Step 1:-
 Start Kali Linux and login, preferably as root.
Step 2:-
 Plug-in your injection-capable wireless adapter, (Unless your native computer
wireless card supports it).
Steps for Wi-Fi Hacking
Step 3:-
 Now you will display the kali Linux Home Screen.
Steps for Wi-Fi Hacking
Step 4:-
 Open a terminal window by pressing the terminal icon at the top left.
 Otherwise You Press the shortcut key Ctrl + t.
 Terminal are open.
Steps for Wi-Fi Hacking
Step 5:-
 Open Terminal and Find out the name of your wireless adapter.,
type ifconfig on a terminal. See the result. (here my wireless adapter is
‘wlan0’)
 et0:- no wireless extensions.
 l0:- no wireless extensions.
 Wlan0:- it will Display the External Wi-Fi Adaptor Information.
Steps for Wi-Fi Hacking
Step 6:-
 Next type in the command “airmon-ng”. see if your adapter is seen
by Kali Linux. It should show the interface, chipset, and driver.
n:- It will check the number of wlan0 adaptor
g:- It will check the wlan0 adaptor signal.
Steps for Wi-Fi Hacking
Step 7:-
 Type airmon-ng start followed by the interface name of your wireless card.
mine is wlan0.
 my command would be: airmon-ng start wlan0
Steps for Wi-Fi Hacking
Step 8:-
 Start capturing packets. we’ll use airmon-ng to capture the packets in the
air.
 You’ll see the name of the Wi-Fi you want to hack.
 type command airodump – ng wlan0mon
Steps for Wi-Fi Hacking
Step 9:-
 Now stop the capture packets Ctrl + C.
 Type command:-airodump-ng –c [channel no] --bssid [id] –w
/root/Desktop/ wlan0mon.
 This save the all .cap file into the Desktop.
Steps for Wi-Fi Hacking
Step 10:-
 This means that the handshake has been captured, the password is in the
hacker’s hands, in some form or another. You can close the aireplay-ng –
deauth 10 –a [bssid] –c [station] wlan0mon.
Steps for Wi-Fi Hacking
Step 11:-
 Actually, it’s the .cap one, that is important. Open a new Terminal, and type
in this command:
aircrack-ng -b [router bssid] -w [path to wordlist] /root/Desktop/ -
02.cap
 -b stands for bssid, replace [router bssid] with the BSSID of the target
router, mine is 00:14:BF:E0:E8:D5.
 -w stands for wordlist, replace [path to wordlist] with the path to a wordlist
that you have downloaded. I have a wordlist called “wpa.txt” in the root
folder.
 aircrack-ng –b 00:14:BF:E0:E8:D5 –w /root/wpa.txt /root/Desktop/*.cap
Steps for Wi-Fi Hacking
Step 12:-
 Aircrack-ng will now launch into the process of cracking the password.
However, it will only crack it if the password happens to be in the wordlist
that you’ve selected.
 Cracking the password might take a long time depending on the size of the
wordlist.
 Sometimes, it’s not. If this is the case, you can try other wordlists
Steps for Wi-Fi Hacking
Step 13:-
Steps for Wi-Fi Hacking
Step 14:-
 The passphrase to our test-network was “123mun3124bili79” and you can
see here that it was in the wordlist, and air crack found it.
BIBLIOGRAPHY
 https://www.google.co.in/
 http://lewiscomputerhowto.blogspot.in/2014/06/how-to-hack-wpawpa2-
wi-fi-with-kali.html
 http://www.wirelesshack.org/step-by-step-kali-linux-and-wireless-hacking-
basics-wep-hacking-part-3.html
 http://www.hackingeveryday.com/how-to-hack-wifi-wpa2-psk-password-
using-kali-linux-2-0
 https://hackingeveryday.onesignal.com
 https://en.wikipedia.org/wiki/Kali_Linux
 https://www.concise-courses.com/kali-linux-review-and-history/
THANKS 

More Related Content

What's hot

Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
Wireless Penetration Testing
Wireless Penetration TestingWireless Penetration Testing
Wireless Penetration TestingMohammed Adam
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network securityAPNIC
 
penetration test using Kali linux ppt
penetration test using Kali linux pptpenetration test using Kali linux ppt
penetration test using Kali linux pptAbhayNaik8
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and TypesVikram Khanna
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxPrinceKumar851167
 
Intrusion Detection And Prevention
Intrusion Detection And PreventionIntrusion Detection And Prevention
Intrusion Detection And PreventionNicholas Davis
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)mmubashirkhan
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Mukesh Chinta
 
Network security
Network securityNetwork security
Network securityAli Kamil
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and ProtectionChandrak Trivedi
 

What's hot (20)

Kali linux
Kali linuxKali linux
Kali linux
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Wireless Penetration Testing
Wireless Penetration TestingWireless Penetration Testing
Wireless Penetration Testing
 
WEP
WEPWEP
WEP
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
Wireless Cracking using Kali
Wireless Cracking using KaliWireless Cracking using Kali
Wireless Cracking using Kali
 
penetration test using Kali linux ppt
penetration test using Kali linux pptpenetration test using Kali linux ppt
penetration test using Kali linux ppt
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
Intrusion Detection And Prevention
Intrusion Detection And PreventionIntrusion Detection And Prevention
Intrusion Detection And Prevention
 
Windows Security
Windows Security Windows Security
Windows Security
 
Network security
Network securityNetwork security
Network security
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 
Network security
Network securityNetwork security
Network security
 
Kali linux os
Kali linux osKali linux os
Kali linux os
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 

Similar to Wi-FI Hacking

A tutorial showing you how to crack wifi passwords using kali linux!
A tutorial showing you how to crack wifi passwords using kali linux!A tutorial showing you how to crack wifi passwords using kali linux!
A tutorial showing you how to crack wifi passwords using kali linux!edwardo
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hackingMihir Shah
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssueIshan Girdhar
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminarNilesh Sapariya
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Mohammad Fareed
 
How to Hack WiFi on Windows
How to Hack WiFi  on Windows How to Hack WiFi  on Windows
How to Hack WiFi on Windows Vrushank Narola
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11bguestd7b627
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSreekanth GS
 
Cracking WEP Secured Wireless Networks
Cracking WEP Secured Wireless NetworksCracking WEP Secured Wireless Networks
Cracking WEP Secured Wireless NetworksHammam Samara
 
Hack wifi password using kali linux
Hack wifi password using kali linuxHack wifi password using kali linux
Hack wifi password using kali linuxHelder Oliveira
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)Mandeep Jadon
 
Wireless penetration testing
Wireless penetration testingWireless penetration testing
Wireless penetration testingKamlesh Dhanwani
 
Wireless network security
Wireless network securityWireless network security
Wireless network securityVishal Agarwal
 
L14 More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP) it-slidesh...
L14 More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP) it-slidesh...L14 More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP) it-slidesh...
L14 More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP) it-slidesh...phanleson
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxAmanuelZewdie4
 
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngOpen Knowledge Nepal
 

Similar to Wi-FI Hacking (20)

A tutorial showing you how to crack wifi passwords using kali linux!
A tutorial showing you how to crack wifi passwords using kali linux!A tutorial showing you how to crack wifi passwords using kali linux!
A tutorial showing you how to crack wifi passwords using kali linux!
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Wi fi
Wi fiWi fi
Wi fi
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 Issue
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018
 
How to Hack WiFi on Windows
How to Hack WiFi  on Windows How to Hack WiFi  on Windows
How to Hack WiFi on Windows
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
Cracking WEP Secured Wireless Networks
Cracking WEP Secured Wireless NetworksCracking WEP Secured Wireless Networks
Cracking WEP Secured Wireless Networks
 
Hack wifi password using kali linux
Hack wifi password using kali linuxHack wifi password using kali linux
Hack wifi password using kali linux
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Wi fi hacking
Wi fi hackingWi fi hacking
Wi fi hacking
 
Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)
 
Wireless penetration testing
Wireless penetration testingWireless penetration testing
Wireless penetration testing
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
L14 More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP) it-slidesh...
L14 More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP) it-slidesh...L14 More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP) it-slidesh...
L14 More Wireless Hacking: Cracking Wired Equivalent Privacy (WEP) it-slidesh...
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
 
How to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ngHow to hack wireless internet connections using aircrack-ng
How to hack wireless internet connections using aircrack-ng
 

Recently uploaded

Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?Watsoo Telematics
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 

Recently uploaded (20)

Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 

Wi-FI Hacking

  • 1. WIFI HACKINGTHE IN DEPTH STORY OF WHAT ARE WE HACKING Guided by:- Mrs. Hemangini Patel Presented by:- Mehul Jariwala
  • 2. Contents 1. Terminologies in WLAN. 2. Encryption in Wi-Fi WEP WPA WPA2 3. Encryption Algorithm Works. 4. Tools For Hacking. 5. History of Kali Linux. 6. Feature of Kali Linux. 7. Steps to Hack Wi-Fi with Kali Linux.
  • 3. Terminologies in WLAN  IEEE 802.11:- It is a set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network (WLAN).  3 Way Handshake:- It’s a cryptographic message exchange between the AP and The client which authenticates the client to connect to the AP.  Access Point (AP):- An access point is a device, such as a wireless router, that allows wireless devices to connect to a network  SSID (Service Set Identity):- It is also known as the "wireless network name", the SSID is a 32 character, case sensitive name given to a Basic Service Set established by an access point.
  • 4. Encryption in Wi-Fi 1. Wired Equivalent Privacy (WEP)  IT is an easily broken security algorithm for IEEE 802.11.  WEP is the older form of encryption developed around 1997.  WEP, recognizable by the key of 10 or 26 hexadecimal digits.  Once this measure has been taken, other typical LAN security mechanisms such as password protection, end-to- end encryption, virtual private networks (VPNs), and authentication can be put in place to ensure privacy.
  • 5. Encryption in Wi-Fi 2. Wi-Fi protected access(WPA)  It was formally adopted in 2003, a year before WEP was officially retired.  A 128-bit WEP key is usually entered as a string of 26 hexadecimal characters.  Attacker had captured or altered packets passed between the access point and client and the Temporal Key Integrity Protocol (TKIP).  TKIP employs a per-packet key system that was radically more secure than fixed key used in the WEP system.
  • 6. Encryption in Wi-Fi 3. Wi-Fi Protected Access II (WPA2)  One of the most significant changes between WPA and WPA2 was the mandatory use of AES[Advance Encryption Standard] algorithms.  WPA2 uses 256 bit AES algorithms for encryption which makes it much more secure than the ones before it.  Although breaking into a WPA/WPA2 secured network using this vulnerability requires anywhere from 5-14 hours of sustained effort with a modern computer and not be sure to hack the Successfully.
  • 8. Tools For WI-FI Hacking  Air crack:- Air crack is the most popular and widely-known wireless password cracking tools.  Air Snort:- Air Snort is another popular wireless LAN password cracking tool.  Kismet:- Kismet is network sniffer and intrusion detection system.  Air jack:- Air jack is a Wi-Fi 802.11 packet injection tool.  Net Stumble:- Net Stumble is another wireless password cracking tool available only for Windows platform.  Cloud Cracker :- Cloud Cracker is the online password cracking tool for cracking WPA protected wi-fi networks.  Wep Crack:- Cracking WEP
  • 9. History of Kali Linux  Kali Linux is a Debi an-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali contains several hundred tools aimed at various Information Security tasks, such as Penetration Testing, Forensics and Reverse Engineering.  Kali Linux is Developed, Funded and Maintained by Offensive Security, a leading information security training company.  Kali Linux was released on the 13th March, 2013 as a complete rebuild of Backtrack Linux.  Kali Linux is Named after a Hindu goddess.
  • 11. Features of KALI LINUX  Open Source.  Developed in a secure environment.  Available in 32-bit and 64-bit images.  It’s first version of Kali 1.0 was Released on 13th March, 2013.  It’s newest version Kali 2.0 was released on 11th August, 2015.  Multi Language Support.  Rewritten to use Debian standards.  300+ pentesting applications.  Users can customize Kali Linux to suit their needs.
  • 12. Steps for Wi-Fi Hacking Step 1:-  Start Kali Linux and login, preferably as root. Step 2:-  Plug-in your injection-capable wireless adapter, (Unless your native computer wireless card supports it).
  • 13. Steps for Wi-Fi Hacking Step 3:-  Now you will display the kali Linux Home Screen.
  • 14. Steps for Wi-Fi Hacking Step 4:-  Open a terminal window by pressing the terminal icon at the top left.  Otherwise You Press the shortcut key Ctrl + t.  Terminal are open.
  • 15. Steps for Wi-Fi Hacking Step 5:-  Open Terminal and Find out the name of your wireless adapter., type ifconfig on a terminal. See the result. (here my wireless adapter is ‘wlan0’)  et0:- no wireless extensions.  l0:- no wireless extensions.  Wlan0:- it will Display the External Wi-Fi Adaptor Information.
  • 16. Steps for Wi-Fi Hacking Step 6:-  Next type in the command “airmon-ng”. see if your adapter is seen by Kali Linux. It should show the interface, chipset, and driver. n:- It will check the number of wlan0 adaptor g:- It will check the wlan0 adaptor signal.
  • 17. Steps for Wi-Fi Hacking Step 7:-  Type airmon-ng start followed by the interface name of your wireless card. mine is wlan0.  my command would be: airmon-ng start wlan0
  • 18. Steps for Wi-Fi Hacking Step 8:-  Start capturing packets. we’ll use airmon-ng to capture the packets in the air.  You’ll see the name of the Wi-Fi you want to hack.  type command airodump – ng wlan0mon
  • 19. Steps for Wi-Fi Hacking Step 9:-  Now stop the capture packets Ctrl + C.  Type command:-airodump-ng –c [channel no] --bssid [id] –w /root/Desktop/ wlan0mon.  This save the all .cap file into the Desktop.
  • 20. Steps for Wi-Fi Hacking Step 10:-  This means that the handshake has been captured, the password is in the hacker’s hands, in some form or another. You can close the aireplay-ng – deauth 10 –a [bssid] –c [station] wlan0mon.
  • 21. Steps for Wi-Fi Hacking Step 11:-  Actually, it’s the .cap one, that is important. Open a new Terminal, and type in this command: aircrack-ng -b [router bssid] -w [path to wordlist] /root/Desktop/ - 02.cap  -b stands for bssid, replace [router bssid] with the BSSID of the target router, mine is 00:14:BF:E0:E8:D5.  -w stands for wordlist, replace [path to wordlist] with the path to a wordlist that you have downloaded. I have a wordlist called “wpa.txt” in the root folder.  aircrack-ng –b 00:14:BF:E0:E8:D5 –w /root/wpa.txt /root/Desktop/*.cap
  • 22. Steps for Wi-Fi Hacking Step 12:-  Aircrack-ng will now launch into the process of cracking the password. However, it will only crack it if the password happens to be in the wordlist that you’ve selected.  Cracking the password might take a long time depending on the size of the wordlist.  Sometimes, it’s not. If this is the case, you can try other wordlists
  • 23. Steps for Wi-Fi Hacking Step 13:-
  • 24. Steps for Wi-Fi Hacking Step 14:-  The passphrase to our test-network was “123mun3124bili79” and you can see here that it was in the wordlist, and air crack found it.
  • 25. BIBLIOGRAPHY  https://www.google.co.in/  http://lewiscomputerhowto.blogspot.in/2014/06/how-to-hack-wpawpa2- wi-fi-with-kali.html  http://www.wirelesshack.org/step-by-step-kali-linux-and-wireless-hacking- basics-wep-hacking-part-3.html  http://www.hackingeveryday.com/how-to-hack-wifi-wpa2-psk-password- using-kali-linux-2-0  https://hackingeveryday.onesignal.com  https://en.wikipedia.org/wiki/Kali_Linux  https://www.concise-courses.com/kali-linux-review-and-history/