How Easy To Own a WiFi Network(WiFi Hacking)😎:

Hi,
I am back with another blog, In this blog we will learn how easy to hack a WIFI network if you have a good WIFI-adapter and good password lists.
— — — — — — — — — — — — — — — -So Lets Start — — — — — — — — — — — — — —
Requirements :-
(1). A good WiFi Adapter( A WiFi that supports monitor mode & packet injection.“get some best WiFi adapters here”)
(2). Good password lists ( such as rockyou.txt , SecLists or your custom password-lists or Other )
(3). Fern WiFi Cracker should be installed on you system( its comes preinstalled with Kali or Parrot OS...)
When you have all of this stuff then we are good to go.
For this blog I am using Kali Linux and the TP-Link AC600 WiFi adapter which have RTL8821AU chipset and it is best for beginners because its in budget and its support 2.4 GHz and 5 GHz both. but its can’t work without driver on Kali, you can install its driver by simply this command “sudo apt install realtek-rtl88xxau-dkms”.

Now lets crack our first WiFi.
First check is your WiFi adapter is connected to your machine by typing.
~$iwconfig

Now run the fern-WiFi-cracker ( simply run ‘ sudo fern-wifi-cracker ’ ).(fig-3.0)

In the above picture we can see our WiFi adapter wlan0 that we plugged in our machine. Select that interface and click on ‘Scan for Access points’ for scanning near by WiFi networks.
📝 Note : If you getting an error ⚠ shows ‘problem occurred while setting up the monitor mode of selected’ run following commands:
(1). sudo ip link set wlan0 down
(2). sudo ip link set wlan0 name wlan0mon
Now start scanning you will get all the near by WiFi networks, in the picture below you can see i am getting ‘6’ WiFi networks.(fig-4.0)

Now click of ‘ WiFi WPA’ for see all the WiFi networks. You will see a new window opened.(fig-5.0)

Now click on the ‘target network’ and select the password list and click the ‘WiFi Attack’ that on the right side and its start attacking, you can see in below picture.(fig-6.0)

Now its will start attacking on the selected network first its deauthenticat the connected devices, then when the devices trying to connect back to the router its capture the handshakes and then start bruteforcing using the given password list. After that password will be cracked if it present in the given password list.(fig-7.0)


Keep learning, keep hacking(ethically ofcourse).
