How to crack the wireless route password Crack the wireless route password of the detailed graphic steps
Method 1:
I live in a neighborhood where there are several searchable wireless networks, the signal is weak, one has no password, but rarely can connect.
This is the wireless network found using the laptop's built-in intel3945 wireless card
After the connection, the speed is basically 1M-2M, the signal is weak, but it is still stable, and the line is basically not dropped.
I bought zydas wireless network card on Taobao, known as "God card", the chip is 1211B, and supports BT3 cracking.
Also purchased Asus 5DB omnidirectional antenna, DLINK USB socket, anti-interference magnetic loop USB extension cable 3 meters.
With 2DB antenna, relatively small, signal reception ability is poor. Asus 5DB antenna on the right.
This network card is relatively small, you can plug directly into the laptop, or you can use a USB extension socket.
The network card is equipped with a driver disk. After the driver is installed, the device manager is shown in the figure. Local connection and 3945 wireless card are disabled.
The 2DB antenna of the Shenka can search for a network that is not as good as the 3945 network card that comes with the laptop.
God card with Asus 5DB omnidirectional antenna, the signal has been enhanced a lot, and the AP search has several more.
The same AP is connected through the God card, and the speed is increased from the original 1M to 12M-18M.
Integrate BT3 into USB boot disk for cracking wireless AP password.
BT3 Startup process. User name root, password toor, enter startx to start the GUI.
Running spoonwep to select a better signal AP to crack, not necessarily a success, the same AP can try several times at different times.
The picture shows the cracked password: 123456789B.
WEP encryption password is 10 bits if it is hexadecimal, ASCII form is 5 bits, each segment is 3, take the back.
The first broken password is 31:32:33:34:35, the actual password is 12345... Khan, that was a lot of work.
The WEP that can also be used in the signal in the community has basically been cracked, and the feeling of rubbing against the network...... What a ride.
Method 2: Centrino key five minutes crack method
1. Introduction to cracking software
WinAirCrackPackThe toolkit is a wireless LAN scanning and key cracking tool, including airodump and aircrack. It can monitor the data transmitted in the wireless network, collect packets, and can calculate WEP/WPA keys.
2. Composition of experimental environment system
2.1 Hardware Environment
Choose a wireless router or AP with WEP and WPA encryption
Two laptops with Centrino wireless network cards (defined as STA1 and STA2, respectively, as legitimate wireless access users)
Capture a wireless NIC
u One laptop (defined as STA3, as an intruder)
2.2 Software Environment
Intruder STA3 :WinAirCrackPack toolkit,
Note :STA3 is required to enable the Wireless Zero Config service in Control Panel -> Administrative Tools -> Services.
3. Experimental topology diagram
4, configure the wireless router (according to the actual network environment)
(1)STA1 is connected to the wireless router (not encrypted by default). Right-click the icon under the screen and select "View available wireless networks" to pop up a window as shown in Figure 1.
It shows that there are multiple available wireless networks, double-click TP-LINK to connect to the wireless router, and the connection is successful in a moment.
(2) Open Internet Explorer and enter IP address :192.168.1.1(the default LAN IP address of the wireless router).
(3) Log in to the wireless router management page (user name :admin, password :admin).
Click LAN Port Settings under Network Parameters on the left of the page, set IP Address to 192.168.1.8, and save the Settings.
(4) Open Internet Explorer, enter IP address :192.168.1.8, and log in to the wireless router management interface again. (Note that the TP-LINK wireless router was selected in this experiment.
Other brands such as CISCO have similar configuration options), click "Wireless Settings" on the left of the interface under the "Basic Settings" option.
1) Set Mode to 54Mbps(802.11g).
2) Set Key Format to ASCII code.
3) Set Key Type to 64 bits.
4) Set Key 1 to pjwep;
5) Click Save.
(5) After the wireless router has set the WEP key, STA1 needs to reconnect to the wireless router (the key entered is the same as the key set by the wireless router), and the connection is successful in a moment.
(6) Open Internet Explorer, enter IP address :192.168.1.8, log in to the wireless router management page again, click DHCP Service under DHCP Server on the left of the page, click Disable and save the Settings, as shown in Figure 8. Click Restart Router under System Tools to restart the router.
5, crack WEP, WPA keySoftware download
STA3 downloads the software for cracking the key from the Internet as follows:
(1) Type "WinAircrackPack download" into the Google search page to search.
Click on "Security Focus: Security Tools -WinAircrackPack.zip" in the above page, the following page will pop up.
(2) Click Download to save the software. You can decompress the software to any location on the local disk (the following is an example of decompressing the software to the root directory of drive E).
6. Install the captured wireless NIC
Note: The driver for capturing the wireless network card is Atheros v4.2.1, the card must use Atheros AR5001, AR5002, AR5004, AR5005 or AR5006 chipset, the network card in the following table can be used. In this experiment, we used Netgear's 108M wireless network card (model :WG511T).
(1) Install the capture wireless network card driver on the STA3 notebook. Insert the wireless network card and the window shown in Figure 11 pops up. Select No, not yet, and click Next.
(2) Select Install from list or specified location and click Next.
(3) Select Do not Search and click Next.
(4) click "from the disk to install", click "browse" in the pop-up window, select E: WinAircrackPackatheros421 @ (net5211 files in the directory, click "open", then click "ok", click "next", in the process of installing a pop-up window shown.
7. Crack the WEP key
(1) Let STA1 and STA2 reconnect to the wireless router.
(2) Run airodump on the STA3 laptop, which is used to capture the packet, and select "16" as prompted: the serial number of the wireless network card used to crack;
"a", select the chip type. In this case, select atheros chip.
6 indicates the channel number. Generally, 1, 6, and 11 are the common channel numbers. Select 0 to collect all channel information.
"testwep" (the input file name can be arbitrary);
y: Select y when cracking WEP and n when cracking WPA.
(3) Press enter to enter the following screen.
(4) When the communication data traffic of the AP is extremely frequent (for example, STA1 and STA2 can be copied to generate data traffic), the corresponding value growth rate of "Packets" will be greater. Close airodump window and start WinAircrack when about 300,000 "Packets" are captured (for example, 1 million packets need to be captured if 104-bit RC4 encryption is used).
(5) Click "General" on the left to set, select the encryption type as "WEP", and add the captured file (testwep.ivs).
(6) Click "Advanced" on the left to set and select the location of "Aircrack".
(7) After all Settings, click the "Aircrack the key" button in the lower right corner to pop up the following window.
(8) Select the BSSID to crack the network (" 1 "in this experiment), and press enter to get the final WEP key.
8. Crack the WPA key
(1) Modify the encryption type and method of the wireless router, and set it to WPA-PSK authentication and TKIP encryption.
(2) Run airodump on the STA3 notebook, which is used to capture data packets. Select "16", "a", "6", "testwpa" (the input file name can be any), "n" as prompted.
(3) Press enter to enter the following screen
(4) Let STA1 reconnect to the wireless router, and airodump will capture the process of four handshakes between a wireless router and STA1.
(5) Start WinAircrack.
(6) Click "General" on the left to set, select the encryption type as "WPA-PSK", and add the captured file (testwpa.cap).
(7) Click "Wpa" on the left to select a dictionary file (password dictionary can be downloaded: for example, lastbit.com/dict.asp).
(8) After all Settings, click the "Aircrack the key" button in the lower right corner to pop up the following window, you can see that a handshake process has been captured.
(9) Select the BSSID to crack the network (" 2 "is selected in this experiment), and after several minutes of calculation after carriage return, the WPA key is finally obtained.
9. An example of the harm to the network after cracking the key (forging AP)
Once the intruders know the WEP or WPA key of the wireless network, they can connect to the local LAN, so that the intruders enjoy the same access to the entire network as normal access users, and carry out deep attacks. Intruders can use IPBOOK,SuperScan, and similar tools to scan computers on a local area network, where files, directories, or entire hard drives can be copied or deleted. Even worse cases such as keylogging, Trojan horses, spyware or other malicious programs can be installed into your system, and the consequences are very serious.
(1) Introduction
When the WEP or WPA password is cracked, the intruder may use the password and other wireless access points (aps) to construct a fake network. When the signal of the fake AP is stronger than that of the normal AP or the user is close to the fake AP, the normal user will naturally access the fake network, and the user will not feel the network, just when the user sends and receives emails normally. We can use tools like CAIN to crack POP3, telnet and other passwords.
(2)POP3 password cracking
1) Turn on CAIN.
2) Click "Configure" on the menu bar to pop up the following window.
3) Select a network adapter that will be used for packet capture, click "OK", select "" and" ", and then click "" to start monitoring packet capture.
4) The normal user starts to receive mail, and the software can capture the login name and password of the mailbox.
(3) The harm after being cracked
When hackers steal your mailbox user name, password, POP3 server and SMTP server IP address, you can directly access your mailbox, your mail information will be completely exposed to hackers.
Related article
-
TP-Link wireless router setup graphic tutorial How to set up TP-Link wireless router diagram
The following to introduce the tp link wireless router Settings, the example is a new router to demonstrate, if you are not sure whether the router has been set before, then it is recommended to reset the TP-link wireless router, you can refer to the next2024-04-24 -
We do not want to share the Internet user login router to modify the parameters of how to do, the simplest way, or modify the default password of the router, the following for you to introduce the router to change the password including the router login password Settings and wireless password modification two2015-05-12
-
Telecom fiber cat and TP-LINK wireless router connection setup wizard graphic details
First, since the default address of both the HG330 and TP-Link routers is 192.168.1.1, you need to connect the desktop network cable directly to the LAN interface of the TP-Link router, then type 192.168.1.1 into your browser and enter your username and password (default2013-09-01 -
The MTU value of the router is set to the best effect
In our common Windows XP operating system, the default MTU value of the system is 1500, which is a standard Ethernet setting value, and is not suitable for broadband networks2012-11-14 -
Wireless router installation and configuration steps diagram
Many people want to install a wireless router at home, so that their mobile terminals can be connected to the Internet, below we will introduce you to the wireless router installation or configuration, will not be a friend can refer to the ha2013-05-30 -
How do Routers do switches Use routers as switches using setup methods
Friends who manage the network may often encounter such a situation, there are only two routers, but only one network cable, then to achieve multiple computers at the same time to surf the Internet requires a switch, then a redundant router can be used as a switch?2012-10-29 -
In fact, the optical fiber cable and our ordinary telephone line is similar, the difference is that the optical fiber cable does not need to connect the Modem (commonly known as "cat") dial-up Internet access, and only need to connect the optical fiber cable directly to the computer can dial up Internet access, but many users for2013-07-11
-
Method of connecting two routers with one network cable or setting up multiple routers
This article introduces two methods that can be used to connect two or more routers with a network cable, although there are more than two methods to connect two or more routers with a network cable, but Xiaobian thinks that these two methods are the best and easiest, let's see2014-02-15 -
We all know that now our computers are using x86 servers, which has become the standard computing platform for enterprise business computing, and IPMI has become the standard management interface for x86 servers, a look at the specific introduction2016-11-15
Latest comments