Forum

How to Hack Wifi Pa...
 

[Solved] How to Hack Wifi Password?  

   RSS

0

Is there any possibility of hacking my neighbors wifi password?

1 Answer
2

Let me answer your question: But the process is little lengthy!

Wireless Networks Cracking
Wireless Networks Cracking is the process of taking advantage of security weaknesses in wireless networks and gaining unauthorized access.

WEP cracking refers to the exploitation of networks using WEP to control security. Basically, there are two types of cracks: passive cracking– this type of cracking has no effect on network traffic until the WEP security has been cracked. It's hard to detect.

Active cracking– this type of attack affects the network traffic more. Compared to passive cracking it is easy to detect. It's more efficient than passive cracking.

Aircrack WEP Cracking Tools– network sniffer and WEP cracker. Can be downloaded from http:/www.aircrack- ng.org

WEPCrack– this program is open source to break 802.11 WEP secret keys. It is a carrying out of the FMS attack. http:/wepcrack.sourceforge.net

Kismet- this can include both visible and hidden wireless networks, sniffer packets and intrusion detection. http:/www.kismetwireless.net /

WebDecrypt– Active dictionary attacks are used in this tool to crack WEP keys. It has its own key generator and filters for packages. http:/wepdecrypt.sourceforge.net/

WPA Cracking

WPA uses an authentication code with 256 pre- shared key or passphrase. Short passphrases are vulnerable to dictionary attacks and other password cracking attacks. You can use the following tools to crack WPA keys.

CowPatty– this tool is used to crack PSKs using a brute force attack. http:/wirelessdefence.org/Contents/coWPAttyMain.htm

Cain & Abel– Capture files from other sniffing programs like Wireshark can be decoded using this tool. Capture files can contain encoded frames of WEP or WPA- PSK. http:/www.softpedia.com/get/Security/Decrypting-Decoding/Cain-and-Abel.shtml

General Attack Sniffing– Packets are intercepted as they are transmitted over a network. Data collected can then be decoded using tools like Cain and Abel.

Attack Man in the Middle( MITM)– this involves plugging into a network and collecting sensitive information.

Service attack denial– the main purpose of this attack is to deny legitimate network resources to users. You can use FataJack to perform this type of attack.

William Moseley is a brazil-based cybersecurity journalist with a passion for covering latest happenings in cyber security and tech world. He is a certified ethical hacker and cyber security consultant.

Share: