Caution :- this is only for education purpose only,this artical is only to learn how the hackers being hackers. Don’t miss use it.
In this topic we are using Kali linux and you can also use Pentestbox.
Case Study: In this case, we have captured some 802.11 (Wireless Network) packets and save the file. Using this file with “Cupp” and “Aircrack-ng”, we will create a password file and crack the password.
Procedure:
⦁ Capture some wlan packets using filter “eth.add==aa:bb:cc:dd:ee” and save the file.
⦁ Go to Kali Linux terminal.
⦁ Change the directory to the desktop.
root@kali:~# cd Desktop
⦁ Download the “Cupp” utility to create wordlist
root@kali:~# git clone https://github.com/chetan31295/cupp.git

- Change the directory to /Desktop/Cupp root@kali:~/Desktop# cd cupp
- List the folders in the current directory. root@kali:~/Desktop/cupp# ls
- Run the utility cupp.py root@kali:~/Desktop/cupp# ./cuppy.py

- Use Interactive Question for user password profiling root@kali:~/Desktop/cupp# ./cupp.py -i

- Provide the closest information about the target. It will increase the chances of successful cracking.
- You can add keywords.
- You can add special characters.
- You can add random numbers.
- You can enable leet mode.

5. After successful completion, you find a new text file named as the first name you type in interactive option. This file will contain a lot of possible combinations. As shown in the figure below, Albert.txt file has been created in the current directory.

6. You can check the file by opening it.

- Now crack the password using Aircrack-ng with the help of password file created.
root@kali:~ # cd
root@kali:~ # aircrack-ng –a2 –b <BSSID of WLAN Router> -w
/root/Desktop/cupp/Albert.txt ‘/root/Desktop/WPA.cap’
WPA.cap is captured packet file.

- This will start the process, and all keys will be checked.

- The result will either show you the key or refuse to crack from the dictionary.
Countermeasures
Wireless Technologies such as Wi-Fi and Bluetooth are the most popular and widely- used technologies. These technologies can be secured using different network monitoring and auditing tools, configuring strict access control policies, best practices, and techniques. As earlier in this chapter, we have discussed Wi-Fi encryptions and their issues, moving from WEP to WPA2, strong authentication, and encryptions, best practices will make your wireless network harder to be compromised. The following mind map shows some basic technique, as well as a countermeasure that is discussed in this chapter.
Mind Map

Thanks for read this topic and please continue reading.
One thought on “Hacking Wi-Fi”