Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

No password is required for router inductive connection (router wireless password cracking)

2025-03-30 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Mobile Phone >

Share

Shulou(Shulou.com)05/31 Report--

Hello everyone, Lin Fei to answer the above questions, the router induction connection does not need a password, the router wireless password cracking many people do not know, now let's take a look!

Five-minute key cracking method for Centrino

1. Introduction of cracking software

WinAirCrackPack Toolkit is a wireless LAN scanning and key cracking tool, mainly including airodump and aircrack tools. It can monitor the data transmitted in the wireless network, collect data packets, and calculate the WEP/WPA key.

two。 The composition of the experimental environment system

2.1 hardware environment

Select a wireless router or AP with WEP and WPA encryption.

Two laptops with Centrino wireless network cards (defined as STA1 and STA2, respectively, as legitimate wireless access users)

Get a wireless card.

A laptop (defined as STA3 as an intruder)

2.2 Software environment

Intruder STA3: WinAirCrackPack Suite

Note that STA3 should turn on the Wireless Zero configuration service in Control Panel-Administrative tools-Services.

3. Experimental topology diagram

4. Configure a wireless router (based on the actual network environment)

(1) STA1 connects to the wireless router (default is not encrypted). Right-click the icon at the bottom of the screen and select "View available wireless networks", which will pop up the window shown in figure 1.

There are several wireless networks available. Double-click TP-LINK to connect to the wireless router, and the connection is successful for a moment.

(2) Open an IE browser and enter the IP address: 192.168.1.1 (the default LAN IP address for the wireless router).

(3) Log in to the wireless router management interface (username 3360admin, password 3360admin).

Click the "LAN Port Settings" option under "Network parameters" on the left side of the interface, set the "IP address" to 192.168.1.8 and save.

(4) Open the IE browser, enter the IP address: 192.168.1.8, and log in to the wireless router management interface again (note that the TP-LINK wireless router is selected in this experiment.

Other branded products such as Cisco have similar configuration options), click the basic settings option under Wireless Settings on the left side of the interface.

1) Select "mode" as "54 Mbps (802.11g)"

2) Select "key format" as "ASCII Code"

3) Select "key type" to "64-bit"

4) set key 1 to "pj WEP"

5) Click "Save".

(5) after the WEP key is set up by the wireless router, STA1 needs to reconnect to the wireless router (the key entered is the same as the key set by the wireless router), and the connection is successful for a moment.

(6) Open the IE browser, enter the IP address: 192.168.1.8, log in to the wireless router management interface again, click the DHCP service option under the DHCP server on the left side of the interface, click do not enable and save, as shown in figure 8. Click restart the router under system tools, and restart the router.

5. Download software to crack WEP and WPA keys

3 STA3 downloads software from the Internet to crack the key. The specific steps are as follows:

Enter "WinAircrackPack Download" on the Google search page to search.

Click "Security focus: security tools-WinAircrackPack.zip" on the above page, and the following page pops up.

(2) Click "download" to save the software, which can be unzipped to any location on the local disk (below we will extract to the root directory of E disk as an example).

6. Install the packet capture wireless network card.

Note: use Atheros v4.2.1 as the driver for the wireless network card for packet capture. The card must use Atheros AR5001, AR5002, AR5004, AR5005 or AR5006 chipsets. All the network cards in the following table are available. In this experiment, we used Netgear's 108m wireless network card (model: WG511T).

(1) install the packet capture wireless card driver on the STA3 notebook. Insert the wireless network card and the window shown in figure 11 will pop up. Select No, not yet, and then click next.

(2) Select install from list or specified location, and then click next.

(3) Select "do not search" and click "next".

(4) Click "install from disk", click "Browse" in the pop-up window, select e: winaircrackpackageros 421 @ (net5211 file in the directory, click "Open", and then click "OK" and "next". The window shown in the figure will pop up during the installation process.

7. Crack the WEP key

(1) have STA1 and STA2 reconnect to the wireless router.

(2) run airodump on a STA3 laptop. This tool is used to capture data packets. Select "16" in turn as prompted: the serial number of the wireless card used to crack it.

"a", select the chip type, here select the atheros chip

"6", channel number, generally 1, 6, 11 are commonly used channel numbers. Select "0" to collect all channel information.

"testwep" (the input file name can be arbitrary)

"y", select "y" when cracking WEP and "n" when cracking WPA.

(3) enter the following interface after entering the enter.

(4) when the communication data traffic of the AP is extremely frequent (for example, STA1 and STA2 can be used to copy files to generate data traffic), the corresponding numerical growth rate of "Packets" will be greater. Close the airodump window and start WinAircrack when you catch about 300000 (for example, you need to catch 1 million packets using RC4 encryption) "Packets".

(5) Click "General" on the left to set, select the encryption type to "WEP", and add the captured file (testwep.ivs).

(6) Click "Advanced" on the left to set up, and select the location of "Aircrack".

(7) after all settings, click the "Aircrack the key" button in the lower right corner to pop up the following window.

(8) Select the BSSID to crack the network (select "1" in this experiment), and enter to get the final WEP key.

8. Crack the WPA key

(1) modify the encryption type and encryption method of the wireless router and set it to WPA-PSK authentication and TKIP encryption.

(2) run airodump on the STA3 notebook, the tool is used to capture data packets, press the prompts to select "16", "a", "6", "testwpa" (the input file name can be arbitrary), "n".

(3) enter the following interface after entering enter

(4) Let STA1 reconnect to the wireless router, and airodump will capture a four-way handshake between the wireless router and STA1.

(5) start WinAircrack.

(6) Click "General" on the left to set, select the encryption type to "WPA-PSK", and add the captured file (testwpa.cap).

(7) Click "Wpa" on the left to set up, and select a dictionary file (password dictionary can be downloaded: for example, lastbit.com/dict.asp).

(8) after all settings, click the "Aircrack the key" button in the lower right corner to pop up the following window, you can know that a handshake process has been captured.

(9) choose the BSSID to crack the network ("2" in this experiment), enter and calculate for a few minutes, and finally get the WPA key.

9. An example of the harm to the network after cracking the key (forged AP)

Once the intruder knows the WEP or WPA key of the wireless network, he can connect to the local local area network, so that the intruder has the same access to the whole network as the normal access user to carry out in-depth attacks. Intruders can use tools like IPBOOK,SuperScan to scan computers in the local area network, where files, directories, or entire hard drives can be copied or deleted, or even worse, such as keyloggers, Trojan horses, spyware or other malicious programs, can be installed on your system, which can be very serious.

(1) introduction

When the WEP or WPA password is cracked, the intruder may use the password and other wireless access points (AP) to construct a fake network. When the signal of the camouflage AP is stronger than the normal AP or when the user approaches the camouflage AP, the normal user will naturally access the fake network. For the user, it is impossible to feel the network, just when the user is sending and receiving email normally. We can use tools like CAIN to crack passwords such as POP3, telnet and so on.

(2) POP3 password cracking

1) Open CAIN.

2) Click the menu bar "Configure" to pop up the following window.

3) Select a network adapter that will be used for packet capture, click OK, select "and", and then click "" to start monitoring the packet capture.

4) normal users begin to receive email, and the software can capture the login name and password of the mailbox.

(3) the harm after being cracked

When the hacker steals your email user name, password, POP3 server and SMTP server IP address, you can access your email directly, and your email information will be completely exposed to the hacker.

At the end of this article, I hope it will be helpful to you.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Mobile Phone

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report