![]() Note: If you want a better step by step on how to hack a WiFi, check out my previous post I connected to the wifi using the decrypted key, it allocated an IP to me using DHCP: 192.168.0.102.The key for the neighbor’s wifi turned out to be: 1234567890 – easy to guess just what I expected from someone using WEP security in 2014. Saved the data packets in a file called neighbor-01.cap and cracked the password using Aircrack-ng’s dictionary attack module.Meanwhile, I used aireplay-ng -arpreplay to increase the data rate since I am not a patient soul. Collected the required number of data packets from the WEP network.Discovered the WEP AP having SSID ‘dlink’ (notice the weak signal power from neighbor’s house to mine).I tested penetrating this WEP access point using the same Aircrack-ng Suite of tools as I have mentioned in I found one access point using WEP security which is great since WEP is an outdated protocol with poor security. It takes a long time and success isn’t guaranteed. 3 of these were using WPA/WPA2 and I was in no mood for a dictionary attack on WPA handshake. ![]() While conducting authorized wireless testing, I noticed 4 wireless access points belonging to the target network. Please note that prior to beginning the test you should seek explicit consent from the owner if the access point does not belong to you. Disclaimer: For educational purposes only: This is meant merely to exhibit the dangers of using poor wireless security.
0 Comments
Leave a Reply. |