SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Crack WEP networks with Commview and Aircrack-ng


Tools Needed :

1) Commview for Wifi

2) Aircrack-ng



Instructions :

1) Download, Install and open Commview for wifi.




2) Click on the “Blue play button” and the screen shown below will appear. Click on the “Start
Scanning” button.




                                                1
3) Now as all the available networks start to load, look for your target. Click on your target
network (Make sure its WEP) and proceed to press the “Capture” button. (Shown Below)




                                                 2
4) Now you will see the screen shown below as they collect packets. I have read tutorials
claiming that a minimum of 5000 packets is needed. But in my experience, iv had to collect at
least 15,000 packets before successfully cracking it.




Note : The packets are secondary, What is actually happening here is that we are trying to
collect as much IVs (Initialization vector) from those retrieved packets. The more IVs collected
the higher the chance of cracking it. So if you collected 5000 packets but have shit loads of IVs in
them, Then that is all you will need. But if the IVs is limited then you might have to go for 15,000
                                                 3
+++++++ packets. Do the Math.

5) Now that i have collected around 50,000 packets, i proceed to click on the “blue stop button.”
Next click on the “Logging” tab to check where the packets were saved on your hard drive. In my
case its saved on my desktop. Or if you prefer in the future do this setting before starting.
(Shown Below)




6) Now minimize Commview and locate the logged packets on your hard drive. Once you have
found it, double click on it and a screen will appear. Click “File”, “Save as” and change the output
file to “WireShark/TCPDump” and press save.

7) Now lets proceed to “aircrack-ng.zip” and unzip the folder to your desktop.


                                                 4
8) Double click on the extracted folder and locate the bin folder within.

9) Once you are inside the bin folder, locate the file Aircrack-ng-GUI.exe and double click on it.
The screen shown below will appear.




10) Click on the “Choose Button” and direct it to your Wireshark file that you just saved a
minute ago.

11) Lets keep the Encryption type to “WEP”.

12) Key Size : 128

13) Now proceed to press on the launch button. A command prompt will appear, allow it to fully
load .

14) Index number of target network? In my case i key in 1 and press enter.

15) The screen shown below will appear, sit back and wait for it to do its magic. And before you
know it! Voila!




                                                 5
Congratulations! We have successfully cracked the WEP password !



Contributed By

James (www.jameslovecomputers.wordpress.com)




                                             6

Weitere ähnliche Inhalte

Was ist angesagt?

Max Gallo - You don't know MobX State Tree - Codemotion Milan 2018
Max Gallo - You don't know MobX State Tree - Codemotion Milan 2018Max Gallo - You don't know MobX State Tree - Codemotion Milan 2018
Max Gallo - You don't know MobX State Tree - Codemotion Milan 2018Codemotion
 
State of the Browser - London Web Standards
State of the Browser - London Web StandardsState of the Browser - London Web Standards
State of the Browser - London Web StandardsTerence Eden
 
ClusterDesktop how-to install on computer with Linux
ClusterDesktop how-to install on computer with LinuxClusterDesktop how-to install on computer with Linux
ClusterDesktop how-to install on computer with LinuxEmil Parashkevov
 
20170926 Inter-Actief Lunchtalk Jair Santanna
20170926 Inter-Actief Lunchtalk Jair Santanna20170926 Inter-Actief Lunchtalk Jair Santanna
20170926 Inter-Actief Lunchtalk Jair SantannaUniversity of Twente
 
Redmine on amazon ec2
Redmine on amazon ec2Redmine on amazon ec2
Redmine on amazon ec2Ikuru Kanuma
 
Converting parallels or vm ware to virtual box
Converting parallels or vm ware to virtual boxConverting parallels or vm ware to virtual box
Converting parallels or vm ware to virtual boxCarlos Eduardo
 
NFS ubuntu Server and windows 7 Client
NFS ubuntu Server and windows 7 ClientNFS ubuntu Server and windows 7 Client
NFS ubuntu Server and windows 7 ClientAyoung Saing-exe
 
How to make a WoW server Warlords of Draenor
How to make a WoW server Warlords of DraenorHow to make a WoW server Warlords of Draenor
How to make a WoW server Warlords of DraenorMohit Maheshwari
 
Installing Windows 10 in VirtualBox
Installing Windows 10 in VirtualBoxInstalling Windows 10 in VirtualBox
Installing Windows 10 in VirtualBoxMatthew Jericho Sy
 
PLNOG16: Automatyzacja tworzenia sieci w środowisku Vmware, Maciej Lelusz
PLNOG16:  Automatyzacja tworzenia sieci w środowisku Vmware, Maciej LeluszPLNOG16:  Automatyzacja tworzenia sieci w środowisku Vmware, Maciej Lelusz
PLNOG16: Automatyzacja tworzenia sieci w środowisku Vmware, Maciej LeluszPROIDEA
 
Dji phantom 2 vision vision+ open wrt webgui install
Dji phantom 2 vision vision+ open wrt webgui installDji phantom 2 vision vision+ open wrt webgui install
Dji phantom 2 vision vision+ open wrt webgui installSeyoung Park
 
OPSec for Beginners
OPSec for BeginnersOPSec for Beginners
OPSec for Beginnerskyraadams
 
Instructions
InstructionsInstructions
Instructionsds5ysm
 
The Windows 10 tips you wished you knew last week
The Windows 10 tips you wished you knew last weekThe Windows 10 tips you wished you knew last week
The Windows 10 tips you wished you knew last weekOlav Tvedt
 
Exploiting null byte vm
Exploiting null byte vmExploiting null byte vm
Exploiting null byte vmdevanshdubey7
 

Was ist angesagt? (18)

Max Gallo - You don't know MobX State Tree - Codemotion Milan 2018
Max Gallo - You don't know MobX State Tree - Codemotion Milan 2018Max Gallo - You don't know MobX State Tree - Codemotion Milan 2018
Max Gallo - You don't know MobX State Tree - Codemotion Milan 2018
 
State of the Browser - London Web Standards
State of the Browser - London Web StandardsState of the Browser - London Web Standards
State of the Browser - London Web Standards
 
ClusterDesktop how-to install on computer with Linux
ClusterDesktop how-to install on computer with LinuxClusterDesktop how-to install on computer with Linux
ClusterDesktop how-to install on computer with Linux
 
20170926 Inter-Actief Lunchtalk Jair Santanna
20170926 Inter-Actief Lunchtalk Jair Santanna20170926 Inter-Actief Lunchtalk Jair Santanna
20170926 Inter-Actief Lunchtalk Jair Santanna
 
Redmine on amazon ec2
Redmine on amazon ec2Redmine on amazon ec2
Redmine on amazon ec2
 
Converting parallels or vm ware to virtual box
Converting parallels or vm ware to virtual boxConverting parallels or vm ware to virtual box
Converting parallels or vm ware to virtual box
 
NFS ubuntu Server and windows 7 Client
NFS ubuntu Server and windows 7 ClientNFS ubuntu Server and windows 7 Client
NFS ubuntu Server and windows 7 Client
 
04 09-2018--clone vm
04 09-2018--clone vm04 09-2018--clone vm
04 09-2018--clone vm
 
How to make a WoW server Warlords of Draenor
How to make a WoW server Warlords of DraenorHow to make a WoW server Warlords of Draenor
How to make a WoW server Warlords of Draenor
 
Installing Windows 10 in VirtualBox
Installing Windows 10 in VirtualBoxInstalling Windows 10 in VirtualBox
Installing Windows 10 in VirtualBox
 
PLNOG16: Automatyzacja tworzenia sieci w środowisku Vmware, Maciej Lelusz
PLNOG16:  Automatyzacja tworzenia sieci w środowisku Vmware, Maciej LeluszPLNOG16:  Automatyzacja tworzenia sieci w środowisku Vmware, Maciej Lelusz
PLNOG16: Automatyzacja tworzenia sieci w środowisku Vmware, Maciej Lelusz
 
Squidinstallation
SquidinstallationSquidinstallation
Squidinstallation
 
Dji phantom 2 vision vision+ open wrt webgui install
Dji phantom 2 vision vision+ open wrt webgui installDji phantom 2 vision vision+ open wrt webgui install
Dji phantom 2 vision vision+ open wrt webgui install
 
OPSec for Beginners
OPSec for BeginnersOPSec for Beginners
OPSec for Beginners
 
Instructions
InstructionsInstructions
Instructions
 
The Windows 10 tips you wished you knew last week
The Windows 10 tips you wished you knew last weekThe Windows 10 tips you wished you knew last week
The Windows 10 tips you wished you knew last week
 
Exploiting null byte vm
Exploiting null byte vmExploiting null byte vm
Exploiting null byte vm
 
Ethereum genesis
Ethereum genesisEthereum genesis
Ethereum genesis
 

Andere mochten auch

Ewolucja Korporacyjnych Stron Kariery
Ewolucja Korporacyjnych Stron KarieryEwolucja Korporacyjnych Stron Kariery
Ewolucja Korporacyjnych Stron KarieryRadoslaw Knap
 
20121121 presenations for geo mob
20121121 presenations for geo mob20121121 presenations for geo mob
20121121 presenations for geo mobdbyhundred
 
Katechismus 11 - 12 jarigen
Katechismus 11 - 12 jarigenKatechismus 11 - 12 jarigen
Katechismus 11 - 12 jarigenN Couperus
 
Katechismus 9 - 10 jarigen - De Sacramenten
Katechismus 9 - 10 jarigen - De SacramentenKatechismus 9 - 10 jarigen - De Sacramenten
Katechismus 9 - 10 jarigen - De SacramentenN Couperus
 
Analisi ergonomica del sito www.psicologia.unimib.it Milano Bicocca
Analisi ergonomica del sito www.psicologia.unimib.it Milano BicoccaAnalisi ergonomica del sito www.psicologia.unimib.it Milano Bicocca
Analisi ergonomica del sito www.psicologia.unimib.it Milano BicoccaMichele Pierangeli
 
20130320 agisw mapping for the rea loutdoors
20130320 agisw mapping for the rea loutdoors20130320 agisw mapping for the rea loutdoors
20130320 agisw mapping for the rea loutdoorsdbyhundred
 
Where Media Meets Mobile May 2010
Where Media Meets Mobile   May 2010Where Media Meets Mobile   May 2010
Where Media Meets Mobile May 2010Hugh Griffiths
 
elektrik tingkatan satu
elektrik tingkatan satuelektrik tingkatan satu
elektrik tingkatan satunur wateeqa
 

Andere mochten auch (20)

Innovation, Openness And ICTs
Innovation, Openness And ICTsInnovation, Openness And ICTs
Innovation, Openness And ICTs
 
Bay of Plenty Wedding Makeup - 2015
Bay of Plenty Wedding Makeup - 2015Bay of Plenty Wedding Makeup - 2015
Bay of Plenty Wedding Makeup - 2015
 
Ewolucja Korporacyjnych Stron Kariery
Ewolucja Korporacyjnych Stron KarieryEwolucja Korporacyjnych Stron Kariery
Ewolucja Korporacyjnych Stron Kariery
 
Small Group Makeup Workshops in Tauranga
Small Group Makeup Workshops in TaurangaSmall Group Makeup Workshops in Tauranga
Small Group Makeup Workshops in Tauranga
 
El pastor
El pastorEl pastor
El pastor
 
20121121 presenations for geo mob
20121121 presenations for geo mob20121121 presenations for geo mob
20121121 presenations for geo mob
 
Global warming
Global warmingGlobal warming
Global warming
 
FACULTAD DE AUDITORIA
FACULTAD DE AUDITORIAFACULTAD DE AUDITORIA
FACULTAD DE AUDITORIA
 
Seventhweek
SeventhweekSeventhweek
Seventhweek
 
Katechismus 11 - 12 jarigen
Katechismus 11 - 12 jarigenKatechismus 11 - 12 jarigen
Katechismus 11 - 12 jarigen
 
Katechismus 9 - 10 jarigen - De Sacramenten
Katechismus 9 - 10 jarigen - De SacramentenKatechismus 9 - 10 jarigen - De Sacramenten
Katechismus 9 - 10 jarigen - De Sacramenten
 
Analisi ergonomica del sito www.psicologia.unimib.it Milano Bicocca
Analisi ergonomica del sito www.psicologia.unimib.it Milano BicoccaAnalisi ergonomica del sito www.psicologia.unimib.it Milano Bicocca
Analisi ergonomica del sito www.psicologia.unimib.it Milano Bicocca
 
Todas somos unha ! :)
Todas somos unha ! :)Todas somos unha ! :)
Todas somos unha ! :)
 
Java and the JVM
Java and the JVMJava and the JVM
Java and the JVM
 
Proyecto ministerio adolescentes
Proyecto ministerio adolescentesProyecto ministerio adolescentes
Proyecto ministerio adolescentes
 
Het Huwelijk
Het HuwelijkHet Huwelijk
Het Huwelijk
 
20130320 agisw mapping for the rea loutdoors
20130320 agisw mapping for the rea loutdoors20130320 agisw mapping for the rea loutdoors
20130320 agisw mapping for the rea loutdoors
 
Acacia Research Learning Forum - Day 2
Acacia Research Learning Forum - Day 2Acacia Research Learning Forum - Day 2
Acacia Research Learning Forum - Day 2
 
Where Media Meets Mobile May 2010
Where Media Meets Mobile   May 2010Where Media Meets Mobile   May 2010
Where Media Meets Mobile May 2010
 
elektrik tingkatan satu
elektrik tingkatan satuelektrik tingkatan satu
elektrik tingkatan satu
 

Ähnlich wie Aircrack windows web

rgpv 7th sem for it & cs Cloud computing lab record
rgpv 7th sem for it & cs Cloud computing lab recordrgpv 7th sem for it & cs Cloud computing lab record
rgpv 7th sem for it & cs Cloud computing lab recordnaaaaz
 
Wi fi hacking using fluxion in kali linux
Wi fi hacking using fluxion in kali linuxWi fi hacking using fluxion in kali linux
Wi fi hacking using fluxion in kali linuxTejasKore3
 
ClusterDesktop how-to use on Mac
ClusterDesktop how-to use on MacClusterDesktop how-to use on Mac
ClusterDesktop how-to use on MacEmil Parashkevov
 
Uccn1003 -may10_-_lab_09_-_wireshark_analysis_live_capture
Uccn1003  -may10_-_lab_09_-_wireshark_analysis_live_captureUccn1003  -may10_-_lab_09_-_wireshark_analysis_live_capture
Uccn1003 -may10_-_lab_09_-_wireshark_analysis_live_captureShu Shin
 
How to Encrypt Your Laptop with TrueCrypt
How to Encrypt Your Laptop with TrueCryptHow to Encrypt Your Laptop with TrueCrypt
How to Encrypt Your Laptop with TrueCryptbrianlawlor
 
Cracking WEP Secured Wireless Networks
Cracking WEP Secured Wireless NetworksCracking WEP Secured Wireless Networks
Cracking WEP Secured Wireless NetworksHammam Samara
 
How to Hack WiFi on Windows
How to Hack WiFi  on Windows How to Hack WiFi  on Windows
How to Hack WiFi on Windows Vrushank Narola
 
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
Lab-10 Malware Creation and Denial of Service (DoS)        In t.docxLab-10 Malware Creation and Denial of Service (DoS)        In t.docx
Lab-10 Malware Creation and Denial of Service (DoS) In t.docxpauline234567
 
Manual wifislax
Manual wifislaxManual wifislax
Manual wifislaxJoseErWapo
 
Operating systems
Operating systemsOperating systems
Operating systemssandrahezro
 
#Data vault, irc warez (ty 4 moving x)
#Data vault, irc warez (ty 4 moving x)#Data vault, irc warez (ty 4 moving x)
#Data vault, irc warez (ty 4 moving x)Vishal Gurujuwada
 
Dell Venue 7 3740
Dell Venue 7 3740Dell Venue 7 3740
Dell Venue 7 3740Kojo King
 
Lab-6 Sniffing Sniffing is an essential method of collec.docx
Lab-6 Sniffing        Sniffing is an essential method of collec.docxLab-6 Sniffing        Sniffing is an essential method of collec.docx
Lab-6 Sniffing Sniffing is an essential method of collec.docxLaticiaGrissomzz
 
Pitfalls and limits of dynamic malware analysis
Pitfalls and limits of dynamic malware analysisPitfalls and limits of dynamic malware analysis
Pitfalls and limits of dynamic malware analysisTamas K Lengyel
 
ClusterDesktop manual how-to use for Linux clients
ClusterDesktop manual how-to use for Linux clientsClusterDesktop manual how-to use for Linux clients
ClusterDesktop manual how-to use for Linux clientsEmil Parashkevov
 
Security & ethical hacking
Security & ethical hackingSecurity & ethical hacking
Security & ethical hackingAmanpreet Singh
 

Ähnlich wie Aircrack windows web (20)

rgpv 7th sem for it & cs Cloud computing lab record
rgpv 7th sem for it & cs Cloud computing lab recordrgpv 7th sem for it & cs Cloud computing lab record
rgpv 7th sem for it & cs Cloud computing lab record
 
Wi fi hacking using fluxion in kali linux
Wi fi hacking using fluxion in kali linuxWi fi hacking using fluxion in kali linux
Wi fi hacking using fluxion in kali linux
 
ClusterDesktop how-to use on Mac
ClusterDesktop how-to use on MacClusterDesktop how-to use on Mac
ClusterDesktop how-to use on Mac
 
Uccn1003 -may10_-_lab_09_-_wireshark_analysis_live_capture
Uccn1003  -may10_-_lab_09_-_wireshark_analysis_live_captureUccn1003  -may10_-_lab_09_-_wireshark_analysis_live_capture
Uccn1003 -may10_-_lab_09_-_wireshark_analysis_live_capture
 
How to Encrypt Your Laptop with TrueCrypt
How to Encrypt Your Laptop with TrueCryptHow to Encrypt Your Laptop with TrueCrypt
How to Encrypt Your Laptop with TrueCrypt
 
Cracking WEP Secured Wireless Networks
Cracking WEP Secured Wireless NetworksCracking WEP Secured Wireless Networks
Cracking WEP Secured Wireless Networks
 
How to Hack WiFi on Windows
How to Hack WiFi  on Windows How to Hack WiFi  on Windows
How to Hack WiFi on Windows
 
Guide to virtualbox and tiny xp for mac os
Guide to virtualbox and tiny xp for mac osGuide to virtualbox and tiny xp for mac os
Guide to virtualbox and tiny xp for mac os
 
Backtrack Manual Part10
Backtrack Manual Part10Backtrack Manual Part10
Backtrack Manual Part10
 
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
Lab-10 Malware Creation and Denial of Service (DoS)        In t.docxLab-10 Malware Creation and Denial of Service (DoS)        In t.docx
Lab-10 Malware Creation and Denial of Service (DoS) In t.docx
 
Manual wifislax
Manual wifislaxManual wifislax
Manual wifislax
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Thou shalt not
Thou shalt notThou shalt not
Thou shalt not
 
#Data vault, irc warez (ty 4 moving x)
#Data vault, irc warez (ty 4 moving x)#Data vault, irc warez (ty 4 moving x)
#Data vault, irc warez (ty 4 moving x)
 
General Knowledge
General KnowledgeGeneral Knowledge
General Knowledge
 
Dell Venue 7 3740
Dell Venue 7 3740Dell Venue 7 3740
Dell Venue 7 3740
 
Lab-6 Sniffing Sniffing is an essential method of collec.docx
Lab-6 Sniffing        Sniffing is an essential method of collec.docxLab-6 Sniffing        Sniffing is an essential method of collec.docx
Lab-6 Sniffing Sniffing is an essential method of collec.docx
 
Pitfalls and limits of dynamic malware analysis
Pitfalls and limits of dynamic malware analysisPitfalls and limits of dynamic malware analysis
Pitfalls and limits of dynamic malware analysis
 
ClusterDesktop manual how-to use for Linux clients
ClusterDesktop manual how-to use for Linux clientsClusterDesktop manual how-to use for Linux clients
ClusterDesktop manual how-to use for Linux clients
 
Security & ethical hacking
Security & ethical hackingSecurity & ethical hacking
Security & ethical hacking
 

Mehr von Norberto Angulo

Mehr von Norberto Angulo (16)

Curso hacking en video nuevos links
Curso hacking en video nuevos linksCurso hacking en video nuevos links
Curso hacking en video nuevos links
 
Configurar el cliente de no ip en linux, dns dinamico
Configurar el cliente de no ip en linux, dns dinamicoConfigurar el cliente de no ip en linux, dns dinamico
Configurar el cliente de no ip en linux, dns dinamico
 
Bash shell programming in linux
Bash shell programming in linuxBash shell programming in linux
Bash shell programming in linux
 
Enlaces a libros digitales
Enlaces a libros digitalesEnlaces a libros digitales
Enlaces a libros digitales
 
Clase002
Clase002Clase002
Clase002
 
sistemas distribuidos
sistemas distribuidossistemas distribuidos
sistemas distribuidos
 
Derecho informatico
Derecho informaticoDerecho informatico
Derecho informatico
 
Taller propiedad intelectual
Taller propiedad intelectualTaller propiedad intelectual
Taller propiedad intelectual
 
Propiedad intelectual
Propiedad intelectual Propiedad intelectual
Propiedad intelectual
 
Propiedad intelectualcbe
Propiedad intelectualcbePropiedad intelectualcbe
Propiedad intelectualcbe
 
WirelessKeyloggerEs
WirelessKeyloggerEsWirelessKeyloggerEs
WirelessKeyloggerEs
 
keylogger casero
keylogger caserokeylogger casero
keylogger casero
 
Wireless keyloggeres
Wireless keyloggeresWireless keyloggeres
Wireless keyloggeres
 
Keylogger casero
Keylogger caseroKeylogger casero
Keylogger casero
 
P padrino todo
P padrino todoP padrino todo
P padrino todo
 
Todo es posible
Todo es posibleTodo es posible
Todo es posible
 

Aircrack windows web

  • 1. Crack WEP networks with Commview and Aircrack-ng Tools Needed : 1) Commview for Wifi 2) Aircrack-ng Instructions : 1) Download, Install and open Commview for wifi. 2) Click on the “Blue play button” and the screen shown below will appear. Click on the “Start Scanning” button. 1
  • 2. 3) Now as all the available networks start to load, look for your target. Click on your target network (Make sure its WEP) and proceed to press the “Capture” button. (Shown Below) 2
  • 3. 4) Now you will see the screen shown below as they collect packets. I have read tutorials claiming that a minimum of 5000 packets is needed. But in my experience, iv had to collect at least 15,000 packets before successfully cracking it. Note : The packets are secondary, What is actually happening here is that we are trying to collect as much IVs (Initialization vector) from those retrieved packets. The more IVs collected the higher the chance of cracking it. So if you collected 5000 packets but have shit loads of IVs in them, Then that is all you will need. But if the IVs is limited then you might have to go for 15,000 3
  • 4. +++++++ packets. Do the Math. 5) Now that i have collected around 50,000 packets, i proceed to click on the “blue stop button.” Next click on the “Logging” tab to check where the packets were saved on your hard drive. In my case its saved on my desktop. Or if you prefer in the future do this setting before starting. (Shown Below) 6) Now minimize Commview and locate the logged packets on your hard drive. Once you have found it, double click on it and a screen will appear. Click “File”, “Save as” and change the output file to “WireShark/TCPDump” and press save. 7) Now lets proceed to “aircrack-ng.zip” and unzip the folder to your desktop. 4
  • 5. 8) Double click on the extracted folder and locate the bin folder within. 9) Once you are inside the bin folder, locate the file Aircrack-ng-GUI.exe and double click on it. The screen shown below will appear. 10) Click on the “Choose Button” and direct it to your Wireshark file that you just saved a minute ago. 11) Lets keep the Encryption type to “WEP”. 12) Key Size : 128 13) Now proceed to press on the launch button. A command prompt will appear, allow it to fully load . 14) Index number of target network? In my case i key in 1 and press enter. 15) The screen shown below will appear, sit back and wait for it to do its magic. And before you know it! Voila! 5
  • 6. Congratulations! We have successfully cracked the WEP password ! Contributed By James (www.jameslovecomputers.wordpress.com) 6