Thursday, October 15, 2009

Lab 13th October 2009

Today, Mr Zaki will show us how to hack the wireless in the lab. At the beginning, we have to detect the DLink wireless by using our own laptop because PC at lab does not provide the wireless driver. We need to connect it and the password is given as”1a2b3c4d”. The tools that will be use to hack wireless is wireless NIC(USB) and also backtrack either backtrack 2 or 3 or 4.

Firstly, we using command prompt to login with the username is “root” and the password is “toor”. Next, Mr. Zaki gave us a link and we download backtrack from www.remote-exploit.org/backtrack.html. We type “ipconfig” to know whether the network card can be used then type “iwconfig” to know whether the wireless network card can be used.

The real key is set on the wireless access point, 24 key is given by the IV and 40 key is given by us. To know it has been switch on, we need to type “ipconfig” then type “ iwconfig rausb0 mode monitor” following by “iwconfig”. We will see the Mode: Monitor”. After that, we start the backtrack and plugin USB.

Besides that, we use “kismet” to scan the wireless. Thus, we can get all the information of D-Link. In command prompt, we type “s” for sorting and “b” is for sorting according to BSSID. At this moment, we need an encryption key. We use airodump to cache the packet and save it in some path. Type “ airodump –ng –ivs –w output –abg rausb0” where the “output” is the filename and rausb0 is the wireless network card.

After that, type “aireplay-ng -3 -b 00:1E:58:FB:57:ED -h 00:22:6B:A9:59:AF -x 1024 rausb0” where the first address is the MAC address, the second address is local MAC address. If we send a lot of packet, then it will send back response.Next, Type 'aircrack-ng -0 -n 64 -f 4 output-06.ivs' where 'output' is the file name, this command is to use to get the password.

At the end of this lab, I have learnt how to hack the wireless password. But Mr Zaki advice us do not use in a wrong way.

No comments :

Post a Comment