Tricks 2: Step to Crack Wi-fi Password:
Steps:
1. Boot your system with a backtrack 5 live dvd ora pendrive.
2. Goto Backtrack > Exploitation Tools > Wireless Exploitation Tools > WLAN Exploitation > fern-wifi-cracker
3. This is will open a fern wifi cracker window. Now the First step is to select the interface. Here in my case i have selected wlan0 interface .
4. To scan for Access Point click on the 2nd button ( wifi icon ).
Once you get the Access Point ,various AP’s of WEP and WPA are detected.
Fern wifi cracking
Now I am going to crack the WEP Encryption .
In my case , i have selected one Access Point and click on the Attack button.
Access Points fern wifi cracking
Once you click on the Attack button , it will start collecting packets.
attack collect packer
WEP KEY FOUND
Once your IVS Packet count reaches 10000 or greater than that , its automatically crack the key and display it on the screen .
Password Found
KEY DATABASE
To see the database , click on the Key Database button .
WPA CRACKING : For WPA cracking the steps are same except you just need to specify the dictionary file (a file containing list of passwords) for the attack.
Enjoy..
Dark Web Or Darknet
Dark Web The dark web, also referred to as the darknet, is an encrypted portion of the internet that is not indexed by search engines . The dark web is a subsection of the deep web . Neither dark nor deep web pages can be found on search engine results pages ( S RP E ) , but deep web pages can be accessed by anyone with a browser who knows the URL . Dark web pages, in contrast, requires special software with the correct decryption key, as well as access rights and knowledge of where to find the content. Although the dark web is sometimes portrayed as a domain frequented by criminal elements, it is also created and used by people who require privacy for entirely legal reasons, such as the exchange of proprietary business information. In such a case, information may be exchanged through an encrypted peer-to-peer (P2P) network connection or by using an overlay network, such as Tor. The anonymity that Tor and other overlay networks provide...
Comments
Post a Comment