{"id":929,"date":"2017-01-22T18:06:02","date_gmt":"2017-01-22T15:06:02","guid":{"rendered":"http:\/\/decrypthash.ru\/en\/?page_id=929"},"modified":"2017-01-22T18:07:37","modified_gmt":"2017-01-22T15:07:37","slug":"hacking-wifi-network-or-protection-from-hacking","status":"publish","type":"page","link":"https:\/\/decrypthash.ru\/en\/articles-and-help\/hacking-wifi-network-or-protection-from-hacking\/","title":{"rendered":"Hacking wifi network or protection from hacking?"},"content":{"rendered":"<h1><span id=\"result_box\" class=\"short_text\" lang=\"en\" tabindex=\"-1\">Hacking wifi network or protection from hacking?<\/span><\/h1>\n<p><span id=\"result_box\" class=\"\" lang=\"en\" tabindex=\"-1\">This statte we re-describe way to capture packets from the wifi network with which you can pick up the password or key to the wifi network.<\/span><\/p>\n<p><span class=\"\">The last time<\/span> we helped FOR AirSlax. Now we will do the seizure by Kali system.<\/p>\n<p>To <span class=\"\">start downloading<\/span> the image of <strong>Kali Linux system<\/strong>, you can even download <span class=\"\">for example<\/span> a lightweight version of &#8220;Kali Linux 64 bit Light&#8221;. images can be downloaded <span class=\"\">from the page<\/span> of the <a href=\"https:\/\/www.kali.org\/downloads\/\">official site<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p><span id=\"result_box\" class=\"\" lang=\"en\" tabindex=\"-1\"><span class=\"\">Once<\/span> <span class=\"\">the image<\/span> has to be here, to fill the stick, the program will help us<\/span> <a href=\"https:\/\/decrypthash.ru\/soft\/Universal-USB-Installer-1.9.6.9.exe\">Universal-USB-Installer-1.9.6.9<\/a><\/p>\n<p><span id=\"result_box\" class=\"\" lang=\"en\" tabindex=\"-1\">We kindly uploaded it on our website to be a long time looking for the world wide web. Run the application, and specify the path to the image of Kali<\/span>.<\/p>\n<p><a href=\"http:\/\/decrypthash.ru\/wp-content\/uploads\/2017\/01\/Universal-USB-Installer-1.9.6.9.png\" rel=\"lightbox[929]\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-923 size-full\" src=\"http:\/\/decrypthash.ru\/wp-content\/uploads\/2017\/01\/Universal-USB-Installer-1.9.6.9.png\" alt=\"Universal-USB-Installer\" width=\"596\" height=\"485\" srcset=\"https:\/\/decrypthash.ru\/wp-content\/uploads\/2017\/01\/Universal-USB-Installer-1.9.6.9.png 596w, https:\/\/decrypthash.ru\/wp-content\/uploads\/2017\/01\/Universal-USB-Installer-1.9.6.9-300x244.png 300w\" sizes=\"auto, (max-width: 596px) 100vw, 596px\" \/><\/a><span id=\"result_box\" class=\"\" lang=\"en\" tabindex=\"-1\"><span title=\"\u0412\u043e\u0442 \u0442\u0430\u043a \u043f\u0440\u0438\u043c\u0435\u0440\u043d\u043e \u0434\u043e\u043b\u0436\u043d\u0430 \u0432\u044b\u0433\u043b\u044f\u0434\u0438\u0442 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430 \u0434\u043b\u044f \u0433\u043e\u0442\u043e\u0432\u043d\u043e\u0441\u0442\u0438 \u0437\u0430\u043f\u0438\u0441\u0438 \u043e\u0431\u0440\u0430\u0437\u0430 \u043d\u0430 usb \u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c(\u0444\u043b\u0435\u0448\u043a\u0443).\">That&#8217;s about to be looking for a program ready to burn an image on a usb storage device (USB flash drive). <\/span><span title=\"\u0417\u0430\u0442\u0435\u043c \u043d\u0430\u0436\u0438\u043c\u0430\u0435\u043c Create \u0438 \u0436\u0434\u0435\u043c \u043f\u043e\u043a\u0430 \u043e\u0431\u0440\u0430\u0437 \u0437\u0430\u043f\u0438\u0448\u0435\u0442\u0441\u044f \u043d\u0430 \u0444\u043b\u0435\u0448\u043a\u0443. \">Then click Create and wait until the image is written to the flash drive.<\/span><\/span><\/p>\n<p><span title=\"\u041f\u0440\u043e\u0448\u043b\u043e \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043c\u0438\u043d\u0443\u0442, \u043e\u0431\u0440\u0430\u0437 \u0437\u0430\u043f\u0438\u0441\u0430\u043b\u0441\u044f.\">A few minutes passed, the image recorded. <\/span><span title=\"\u0417\u0430\u043a\u0440\u044b\u0432\u0430\u0435\u043c \u043e\u043a\u043d\u043e, \u0441\u043e\u0445\u0440\u0430\u043d\u044f\u0435\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u044b, \u043f\u0435\u0440\u0435\u0433\u0440\u0443\u0436\u0430\u0435\u043c\u0441\u044f \u0438 \u0432\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u043c \u0444\u043b\u0435\u0448\u043a\u0443 \u0432 usb \u043f\u043e\u0440\u0442. \">Close the window to save documents supercharged and insert the flash drive into the usb port.<\/span><\/p>\n<p><span title=\"\u041f\u0440\u0438 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0435 \u0432\u044b\u0431\u0438\u0440\u0430\u0435\u043c \u043e\u043f\u0446\u0438\u044e Live (amd64) \u0438 \u043e\u0436\u0438\u0434\u0430\u0435\u043c \u043f\u043e\u043b\u043d\u043e\u0439 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u044b. \">When downloading, select Live option (amd64) and expect a full system boot.<\/span><\/p>\n<p><span title=\"\u0412\u0432\u043e\u0434\u0438\u043c \u0434\u0430\u043d\u043d\u044b\u0435 \u0434\u043b\u044f \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438, \u043b\u043e\u0433\u0438\u043d root, \u0430 \u043f\u0430\u0440\u043e\u043b\u044c toor.\">Enter data for the authorization, root login and password toor. <\/span><span title=\"\u041d\u0430\u043c \u043f\u0440\u0435\u0434\u043b\u0430\u0433\u0430\u044e\u0442 \u0432\u044b\u0431\u0440\u0430\u0442\u044c \u0434\u0438\u0430\u043b\u043e\u0433\u043e\u0432\u043e\u0435 \u043c\u0435\u043d\u044e \u0441\u0438\u0441\u0442\u0435\u043c\u044b, \u0432\u044b\u0431\u0438\u0440\u0430\u0435\u043c &quot;Use default config&quot;. \">We offer a select dialog menu system, select the &#8220;Use default config&#8221;.<\/span><\/p>\n<p><span title=\"\u0412 \u043d\u0438\u0437\u0443 \u043f\u043e\u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0434\u0438\u0430\u043b\u043e\u0433\u043e\u0432\u043e\u0435 \u043c\u0435\u043d\u044e, \u043d\u0430\u0436\u0438\u043c\u0430\u0435\u043c \u043d\u0430 \u0442\u0435\u0440\u043c\u0438\u043d\u0430\u043b \u0438 \u043f\u0435\u0440\u0435\u0432\u043e\u0434\u0438\u043c \u043a\u0430\u0440\u0442\u0443 \u0432 \u0440\u0435\u0436\u0438\u043c \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0430:\">At the bottom of the dialog appears, click on the terminal and translate the map in monitor mode:<\/span><\/p>\n<blockquote><p>ifconfig wlan0 down &amp;&amp; iwconfig wlan0 mode monitor &amp;&amp; ifconfig wlan0 up<\/p><\/blockquote>\n<p><span id=\"result_box\" class=\"short_text\" lang=\"en\" tabindex=\"-1\">Look for the available access point attack<\/span><\/p>\n<blockquote><p>airodump-ng wlan0<\/p><\/blockquote>\n<p><a href=\"http:\/\/decrypthash.ru\/wp-content\/uploads\/2017\/01\/kali1.png\" rel=\"lightbox[929]\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-924\" src=\"http:\/\/decrypthash.ru\/wp-content\/uploads\/2017\/01\/kali1-300x190.png\" width=\"350\" height=\"222\" srcset=\"https:\/\/decrypthash.ru\/wp-content\/uploads\/2017\/01\/kali1-300x190.png 300w, https:\/\/decrypthash.ru\/wp-content\/uploads\/2017\/01\/kali1-768x488.png 768w, https:\/\/decrypthash.ru\/wp-content\/uploads\/2017\/01\/kali1.png 901w\" sizes=\"auto, (max-width: 350px) 100vw, 350px\" \/><\/a><\/p>\n<p><span id=\"result_box\" class=\"short_text\" lang=\"en\" tabindex=\"-1\">Choosing for example network<\/span> Mial, \u0435\u0451 \u0412SSID 20:25:64:16:58:8C <span id=\"result_box\" class=\"short_text\" lang=\"en\" tabindex=\"-1\">on the channel<\/span> 1. <span id=\"result_box\" class=\"short_text\" lang=\"en\" tabindex=\"-1\">That is why we are launching<\/span> airodump-ng <span id=\"result_box\" class=\"short_text\" lang=\"en\" tabindex=\"-1\">on the first channel<\/span><\/p>\n<blockquote><p>airodump-ng wlan0 &#8211;channel 1 -w cap2<\/p><\/blockquote>\n<p><span id=\"result_box\" class=\"\" lang=\"en\" tabindex=\"-1\">After -w key goes cap2 prefix file (this name without extension). This file is written to the captured handshake.<\/span><\/p>\n<p><span id=\"result_box\" class=\"\" lang=\"en\" tabindex=\"-1\">You can do nothing &#8211; just wait until someone connects or reconnects in a natural way. If you hurry, you can speed up the process using deauthentication attack.<\/span><\/p>\n<p>To do this, we open a new terminal window and type the command there:<\/p>\n<p>&nbsp;<\/p>\n<blockquote><p>aireplay-ng -0 5 -a 20:25:64:16:58:8C wlan0<\/p><\/blockquote>\n<p><span id=\"result_box\" class=\"\" lang=\"en\" tabindex=\"-1\">There is deauthentication -0, 5 means the number of packets sent, -a 20: 25: 64 16: 58: 8C is BSSID target TD and wlan0 &#8211; network interface in monitor mode.<\/span><\/p>\n<p><span id=\"result_box\" class=\"short_text\" lang=\"en\" tabindex=\"-1\">The result was not long in coming:<\/span><\/p>\n<p><a href=\"http:\/\/decrypthash.ru\/wp-content\/uploads\/2017\/01\/kali2.png\" rel=\"lightbox[929]\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-925 size-medium\" src=\"http:\/\/decrypthash.ru\/wp-content\/uploads\/2017\/01\/kali2-300x117.png\" width=\"300\" height=\"117\" srcset=\"https:\/\/decrypthash.ru\/wp-content\/uploads\/2017\/01\/kali2-300x117.png 300w, https:\/\/decrypthash.ru\/wp-content\/uploads\/2017\/01\/kali2-768x299.png 768w, https:\/\/decrypthash.ru\/wp-content\/uploads\/2017\/01\/kali2-1024x399.png 1024w, https:\/\/decrypthash.ru\/wp-content\/uploads\/2017\/01\/kali2.png 1667w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><span id=\"result_box\" class=\"short_text\" lang=\"en\" tabindex=\"-1\">Inscription<\/span>\u00abWPA handshake: 20:25:64:16:58:8C\u00bb <span id=\"result_box\" class=\"\" lang=\"en\" tabindex=\"-1\">It tells us that the handshake is already captured.<\/span><\/p>\n<p><span id=\"result_box\" class=\"short_text\" lang=\"en\" tabindex=\"-1\">We are sure that this is true:<\/span><\/p>\n<blockquote><p>ls -l cap*.cap<\/p><\/blockquote>\n<p><span id=\"result_box\" class=\"\" lang=\"en\" tabindex=\"-1\">The directory will be displayed our captured handshake<\/span><\/p>\n<p><span id=\"result_box\" class=\"\" lang=\"en\" tabindex=\"-1\">Then, the data packets from the WiFi network is transferred to the page<\/span> <a href=\"https:\/\/decrypthash.ru\/en\/restore-passwords-for-wifi-networks\/\"><span style=\"color: blue;\">Restore passwords for WIFI networks<\/span><\/a><\/p>\n<p><span id=\"result_box\" class=\"short_text\" lang=\"en\" tabindex=\"-1\">And check on the fortress of our wifi network.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><em><span id=\"result_box\" class=\"short_text\" lang=\"en\" tabindex=\"-1\">Thanks also hackware portal for the help \ud83d\ude42<\/span><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hacking wifi network or protection from hacking? This statte we re-describe way to capture packets from the wifi network with which you can pick up the password or key to the wifi network. The last time we helped FOR AirSlax. Now we will do the seizure by Kali system. To start downloading the image of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":446,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-929","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/decrypthash.ru\/en\/wp-json\/wp\/v2\/pages\/929","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/decrypthash.ru\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/decrypthash.ru\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/decrypthash.ru\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/decrypthash.ru\/en\/wp-json\/wp\/v2\/comments?post=929"}],"version-history":[{"count":3,"href":"https:\/\/decrypthash.ru\/en\/wp-json\/wp\/v2\/pages\/929\/revisions"}],"predecessor-version":[{"id":932,"href":"https:\/\/decrypthash.ru\/en\/wp-json\/wp\/v2\/pages\/929\/revisions\/932"}],"up":[{"embeddable":true,"href":"https:\/\/decrypthash.ru\/en\/wp-json\/wp\/v2\/pages\/446"}],"wp:attachment":[{"href":"https:\/\/decrypthash.ru\/en\/wp-json\/wp\/v2\/media?parent=929"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}