WPA-PSK HACKING
When you enable Wi-Fi in public places, you’ll encounter numerous networks that likely utilize WPA-PSK (Wi-Fi Protected Access Pre-Shared Key) encryption, which is commonly used in wireless networks to secure data transmission.
While it offers a level of security, there are vulnerabilities to consider. This guide will explore one of the most common methods of hacking WPA-PSK networks.
Although these networks are susceptible to hacking, it is crucial to emphasize that this guide is strictly for educational purposes. Engaging in these activities on networks without proper authorization is illegal. This is for educational purposes only. Having addressed this disclaimer, let’s explore the underlying mechanisms, the practical execution, and measures to safeguard yourself against such vulnerabilities.
Introduction
When you connect to a network from a wireless device, a handshake is sent from the device to the router. This handshake contains the encrypted password.
While it’s not possible to reverse the encrypted password, you can use a technique called a word list attack. A word list is a huge text file containing thousands of passwords. By comparing the encrypted handshake password with the passwords in the word list, you can determine the real password.
Requirements
Linux
distro distribution;- PC with a network card that supports
monitor mode
; - Install the package
Aircrack-ng
with the commandsudo apt install aircrack-ng
;
Procedure
Determine the Network Interface
Identify the wireless network interfaces, which usually start with (e.g. wlp3s0
).
This information will be needed later.
ip a
The “ip a” command in Linux displays network interface information, including IP addresses, MAC addresses, and related configurations. It is used for troubleshooting and network configuration purposes.
Enable Monitor Mode
Use the airmon-ng
tool to switch your network card to monitor mode.
It will break your internet connection temporarily.
airmon-ng start <wireless interface>
Verify Monitor Mode
Now, the wireless interface should be displayed as <interface>mon
(e.g., wlp3s0mon
).
Run the command and It should appear Mode: Monitor
.
iwconfig
If the wireless interface doesn’t appear, it means your network card doesn’t support monitor mode, and you’ll need the external network card mentioned earlier.
Scan for Networks
Use airodump-ng
to view the networks around you.
This command will display a list of nearby networks along with their BSSIDs
(Network MAC Addresses) and channels
.
airodump-ng <wireless interface>mon
Target Network
Identify and copy/save the BSSID
and channel
of the network you wish to attack.
Capture the Handshake
This command will show all the devices currently connected to that network and the amount of packets
being sent to each device.
For example, watching a video will increase the number of packets sent to the device by a lot.
Type this command in a new terminal window:
airodump-ng -d(--bssid) <BSSID> -w(--write) <filename> -c(--channel) <channel> <wireless interface>mon
<BSSID>
- target network’s BSSID;<channel>
- target network’s channel;<filename>
- the desired name for the captured handshake file;<wireless interface>mon
- the name of your wireless interface in monitor mode;
Deauthentication Attack
Now we need to to send de-authentication packets
to the victim’s device, forcing it to disconnect and reconnect to the network, so we can capture the handshake
.
Leave the previous terminal open (running) and use this command in another terminal:
aireplay-ng -0 10 -a <BSSID> -c <client ESSID> <wireless interface>mon
-0 10
- number of de-authentication packets to send;-a <BSSID>
- target network’s BSSID;-c <client ESSID>
- ESSID (name) of the device you want to de-authenticate;<wireless interface>mon
- the name of your wireless interface in monitor mode;
Capture the Handshake
Observe the terminal running airodump-ng
capture the handshake
and wait for the device to reconnect.
Once the handshake is captured, you can see a message saying WPA handshake: <BSSID>
.
You can stop airodump-ng
by pressing Ctrl+C
.
The captured handshake will be saved in the specified filename.
Word List Attack
Kali Linux comes with pre-installed word lists located in the directory /usr/share/wordlists
.
If you are not on Kali, you can download a word list from here.
Now let’s attempt to match the captured handshake with passwords from the word list.
aircrack-ng -w <wordlist> <filename>
<wordlist>
- path to the desired word list file (e.g. /usr/share/wordlists/rockyou.txt);<filename>
- name of the captured handshake file;
Cracked!
Congratulations! If the password is found in the word list, it will be displayed.
After performing these steps, your internet connection may still be interrupted.
To fix this, you can either restart your computer or execute the command:
airmon-ng stop <monitor interface>
systemctl restart network*
Protecting Yourself
While you cannot prevent the authentication process, you can protect against word list attacks by choosing a long and random password that is unlikely to be found in any word list, like passphrases. Additionally, you can enable MAC address filtering and WPS (Wi-Fi Protected Setup) to enhance security.
Conclusion
We explored the process of WPA-PSK hacking. It is essential to respect privacy and legality when using these techniques. We learned about capturing handshakes, performing de-authentication attacks, and cracking passwords using word lists. Remember to always use this knowledge responsibly and protect yourself.