Namdeath
Container Optimization Pro
2
MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1
400 XP
Wifite2 — is an excellent tool for automated attack on WPA/WPA2 networks. It contains all the best things a human could invent in terms of network hacking — exploiting vulnerabilities, bruteforce WPS, and intercepting a 4-way handshake, a kind of Swiss knife in the world of wardriving.
Preparing
In order to hack WiFi, you need a WiFi adapter that supports monitoring mode. If you have a laptop, you probably have one. You can check for sure by searching for information about your network adapter or by trying to run the wifite2 tool described below. If your network adapter does not support monitoring mode, you will not be able to run the program.
So, let’s start with the tools. We are going to use:
Let’s start by installing Wifite2. On Ubuntu-based systems, this is very easy:
Code:
If you are using another Linux distribution you can download and run the source code. The launch process is described by the authors.
Important note! Make sure that you installed wifite version 2, that is, wifite2. The first version contains bugs and is no longer supported by the developers.
Hashcat installation:
Code:
The sources can be found at this link. And now that both tools are installed, let’s get to work.
Serching for networks.
Run wifite. This can be done by entering the appropriate command into the terminal:
Code:
If your network adapter supports monitoring mode, you will lose your Internet connection and the terminal will look like this:
8 digits — the mask of the most popular password for WiFi networks, especially in older routers. It is this mask that is shown in the argument “?d?d?d?d?d?d?”.
hashcat will let you know if it manages to find the password. If not, it is still possible to use the online service described above.
Read more about hashcat and WiFi hacking https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2.
Preparing
In order to hack WiFi, you need a WiFi adapter that supports monitoring mode. If you have a laptop, you probably have one. You can check for sure by searching for information about your network adapter or by trying to run the wifite2 tool described below. If your network adapter does not support monitoring mode, you will not be able to run the program.
So, let’s start with the tools. We are going to use:
- wifite2 (https://github.com/derv82/wifite2) —for network hacking. It is based on the popular utility aircrack-ng
- hashcat (https://github.com/hashcat/hashcat) — to crack the password hash if the router could not be cracked by exploitation of vulnerabilities. Also you can use online alternatives such as https://hashdog.me/?ref=welcome, gpuhash and etc.
Let’s start by installing Wifite2. On Ubuntu-based systems, this is very easy:
Code:
Code:
sudo apt-get update
sudo apt-get install wifite
Important note! Make sure that you installed wifite version 2, that is, wifite2. The first version contains bugs and is no longer supported by the developers.
Hashcat installation:
Code:
Code:
sudo apt-get install hashcat
Serching for networks.
Run wifite. This can be done by entering the appropriate command into the terminal:
Code:
Code:
wifite
# or
wifite2
Code:
hashcat -m 22000 <file_path> -a 3 ?d?d?d?d?d?d?d?d
hashcat will let you know if it manages to find the password. If not, it is still possible to use the online service described above.
Read more about hashcat and WiFi hacking https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2.