|
|
| |
|
Its toolkit allows you to crack Wi-Fi passwords, create false networks and detect vulnerabilities.
|
|
|
|
|
Tuesday, October 28, 2014:
Kali Linux, the operating system focused on security, can be run
anywhere and everywhere with a CD or USB Drive. Its toolkit allows you
to crack Wi-Fi passwords, create false networks and detect
vulnerabilities. With Kali Linux you can also check your onw network's
security through some measures. Kali Linux has several software systems
which can test security holes in the network including Aircrack, Airbase
and ARPspoof.
|
|
1. Crack Wi-Fi password with Aircrack:
Aircrack and
Reaver are some of the apps used in Kali Linux to crack WiFi networks
and with the Aircrack app you just need to follow some steps. First
disconnect all the wireless networks and open the terminal. Then have a
wireless card with support to injections. Then get a list of all the
networks, locate your network first and start monitoring your own
network. There will be four files which appear as pop-ups on your
desktops. Then you open up a device on your own and connect to WiFi. A
new station gets popped up, take the station number first. Then packets
are sent to your computer to reconnect and you will grab the WPA
Handshake to start cracking the password. As you have the encrypted
version of the router's password with you now, you can easily crack the
same. Aircrack tries all the possible passwords to check out which is
the most suitable one and once the actual one is cracked, you get a
message. Warning: Always maintain a strong password for your router and
make sure WPA2 security protocol is enabled.
2. Create a Fake Network with Airbase:
Hackers
sometimes spoof your network address to watch what you are doing and
trick you sign into a fake network and they perform man-in-the-middle
attacks to gather sensitive data from your network. You can also try the
same with Airbase, a Kali Linux tool. Turn on your WiFi adapter with a
name which is used by another network too, set up the wireless card to
monitor traffic and open up the terminal. As soon as you start
monitoring you can get into spoofing too. Check out all the networks in
your area, locate your network and create a fake network which allows
you spoofing the router and create a clone with the same name. If you
get any hint that your router is spoofed, you can turn off automatic
connection to Wi-Fi.
3. Get into man-in-the-middle attack with ARPspoof:
Man
in the Middle Attacks are most common in WiFi routers and by trying the
same you will be able to intercept network signals between a computer
and a router without even any knowledge of the user. You can learn
packet sniffing and gather information through ARP Spoofing. These
attacks are performed to steal passwords, images and other data over the
network. Turn on ARP spoofing to trick the computer and the router
think that the WiFi adapter is a connectivity bridge. Monitor all the
devices while spoofing. Collect all the traffic between two machines are
loads of tools can be used to capture the information. A window pops up
which transfers data over the network. If there is any unencrypted
information, you can keep a check on the same. Secure your network with a
strong password and always enable a firewall on your machine. |
|
0 comments:
Post a Comment