Thursday 28 July 2011

Wifi CRACKING IN WINDOWS

INTRODUCTION :
Many Windows users here are struggling to grapple WiFi networks because most of the tutorials are based on BackTrack and another UNIX Tools .

Im meet sharing the method to Crack WiFi networks using WEP section protocol . The WEP is a very vuarable to attacks and crapper be unsmooth
easily .
It takes about 5-6 hours if the countersign is weak a broad communication of the WiFi meshwork you are feat to grapple and you hit sometimes 10-12 for more complicated passwords and if the WiFi communication of the Network is weak .
The time taken also changes if the WiFi meshwork you are feat to grapple has some another clients already accessing it .


You module be using two tools .
1.Commview for WiFi :
You module ingest this agency for capturing the packets dispatched and recieved through the Access Point you are feat to grapple .
The more packets you effort the better chances of noise the countersign .
You module requirement more than 1,00,000 oxide packets to fissure the countersign .
The packets module be captured in the .ncp info .
You module ingest this agency to convert the .ncp to .cap .

NOTE : Some WiFi game are based by Commview exclusive in Windows 7 so i declare you establish Win 7 in ur Virtual Machine if ur bill isnt based .


2.Aircrack-Ng GUI :
You module ingest this agency to fissure the countersign of the Access Point using the .cap files you obtained from the Commview application .

NOTE : You requirement to run this as chief .

I hit provided course for both the software below .




Download Links :

These are the course to the authorised website of the tools .
Some Anti Viruses strength notice Aircrack as a virus . It is a simulated positive .

1.Aircrack-NG GUI

Get it from here : Aircrack-ng


2.Commview for Wifi

Get it from here : Network Analysis Tools & Security Software by TamoSoft // CommView for WiFi Download



GET READY TO CRACK :


STEP 1 :
1.Install CommView for WiFi . It doesnt concern whether you establish it in VoIP fashion or Standard fashion . I used VoIP .
It automatically installs the necessary drivers . Allow it to establish .

NOTE : You module not be healthy to enter to some Network using WiFi when using CommView .

STEP 2 :
2.Click on the PLAY ICON in the Left First .






STEP 3 (Choosing the Network (a) ) :
A newborn pane should imbibe up today .
Click on the START SCANNING button .




STEP 4 (Choosing the Network (b) ) :
Click on the WiFi meshwork you poverty to grapple in the Right Coulumn and Click on CAPTURE.
NOTE : This tutorial is exclusive for WEP fortified networks .





STEP 5 (Capturing the Packets) :
The windows should close today and you should wager that CommView has started Capturing Packets .





STEP 6 (Saving the Packets ) :
Now that the Packets are effort captured you requirement to Save them.
Click on Settings->Options->Memory Usage
Change Maximum Packets in pilot to 20000




Click on the LOGGING Tab .
Check AUTO-SAVING
In the Maximum Directory Size : 2000
Average Log File Size : 20




Now CommView module automatically Start Saving packets in the .ncp info at a size of 20MB apiece in the given directory .

STEP 7 ( Concatenating the Logs ) :
Since you are capturing a aggregation of logs you module requirement to concatenate them into erst enter .
To do this go to Logging and click on CONCATENATE LOGS
Choose every the files that hit been saved in your given folder and Concatenate them .

Now you module hit digit .ncf enter .

STEP 8 (Converting .ncf to .cap ) :
Now that you hit digit enter with every the packets you requirement to Convert it into .cap enter for AIRCRACK to fissure .
Click on File->Log Viewer->Load Commview Logs-> Choose the .ncf enter
Now File->Export->Wireshark/TCP dump info .


------------------------------------------------------------------



Aircrack Part :


Now for the Second Part Cracking this is very ultimate .

Just open the Aircrack Folder->Bin->Aircrack-ng GUI.exe

Choose the .cap enter and you should be healthy to do the others .


if you same then advise thank's


No comments:

Post a Comment