Skip to main content

How To Hack And Protect Your Own WPA Network


You probably own a personal Wi-Fi hotspot at home. Having several devices under one roof seems like a good reason to convert your broadband internet into a wireless connection. Some internet providers in your area might even have paid Wi-Fi hotspots for homes and establishments.
Since anyone can connect to your Wi-Fi network, the next best idea is to protect it with a WPA password. A WPA password prevents freeloaders from using your internet and deal with more pressing issues such as privacy and hacking. However, this is not a full-proof method. Securing your Wi-Fi network no longer guarantees safety from prying eyes; let alone people who want to get free internet. People can easily crack your network’s password with the aid of certain tools.
In the early part of this article, we will teach you how to hack your own WPA-secured network with a tool called Reaver. Later on, we will explain how to protect your home network from Reaver attacks.
Hack And Protect Your Own WPA Network
Note: Hacking of other WPA networks is ill-advised and illegal in some countries so we don’t recommend it. We also discourage using Reaver for any malicious intent. Consider this article as an educational tool that will better inform you of how people hack into WPA networks so you can better protect yourself, your family, and friends from hackers.
Requirements:
  • Wi-Fi ready computer. BackTrack works with the wireless cards found in most laptops and computers. It is a bootable Linux environment which makes using Reaver less strenuous. BackTrack doesn’t work on all computers with wireless internet connectivity so there are no guarantees.
  • DVD drive. You need it to boot into BackTrack mode. A built-in DVD drive will come in handy but if your computer doesn’t have one, you can attach a portable DVD drive via USB.
  • BackTrack 5 Live DVD. Reaver can be downloaded from the live program. You can get BackTrack 5 here for free and burn it into a DVD. The latest available version as of this writing is BackTrack 5 R3. To download BackTrack, go the download page and select “Download”. Choose the latest version from the BackTrack Release drop-down menu. Under Windows Manager, select “GNOME”.Then, choose from 32- and 64-bit architecture depending on your computer. Finally, select “ISO” under Image Type and choose your download method.
  • An active WPA network with WPS enabled. For Reaver to work, you need a WPA-secured Wi-Fi network which has WPS enabled. Reaver exploits a WPS security hole which makes hacking WPA networks possible.
Note: If you know how VMWare works, you can choose it instead of ISO under Image Type when downloading BackTrack. Otherwise, stick with ISO image.
You should know…
Reaver takes plenty of time to hack WPA networks. It tests different crack combinations on your router until it identifies the right password. According to its developers, the program could take 4 to 10 hours before Reaver successfully cracks a WPA network. The performance of your computer could determine the speed at which it works. Fortunately, you can pause Reaver without losing progress. To pause the program simply press Ctrl+C while it is running. Just don’t shut down your computer because that will cause Reaver to lose its progress when attempting to crack a WPA network.
Reaver doesn’t work on all routers so there’s no guarantee that it will crack your wireless home network. Furthermore, the wireless network you are trying to hack should have a strong signal.

How to crack WPA networks with Reaver

1. Boot into BackTrack mode. Place your pre-made BackTrack Live DVD into your DVD drive. When BackTrack prompts you to choose from a selection of boot modes, choose “BackTrack Text – Default Boot Text Mode” and hit Enter. After a while, BackTrack will take you to the command line prompt. At the command line prompt, type startx and hit Enter. You will then be taken into a graphical UI of BackTrack.
2. Install Reaver. Reaver is not part of the live DVD so you have to download and install it. You begin by connecting to your home Wi-Fi network. Don’t forget to input your WPA password! Once you’re online, go back to the command prompt and type the following command:
apt-get update
This will download Reaver. When the update is finished, type:
apt- get install reaver
3. Disconnect from your home network. This step is optional but if you want to make sure that Reaver works, you can do it as a precaution. In addition, you can choose to forget your network or even change your WPA password.
4. Find out your wireless card’s interface name. This information is needed for hacking WPA networks. On the Terminal, type the following command and hit Enter
iwconfig
The name identified beside your wireless card information such as IEEE and ESSID is your wireless card’s interface name. It is likely wlan0 but it could be different.
5.  Place your wireless card into “monitor mode”. Using the interface name you acquired from step 4, type the following command and press Enter. For the sake of illustration, we are assuming thatwlan0 is your wireless card’s interface name.
airmon-ng start wlan0
This command will display the name of your monitor mode interface. It will show something like:
(monitor mode enabled on mon0)
Here, mon0 is the name of the monitor mode interface but it varies across devices.
6.  Discover the BSSID of the wireless router you want to crack. You can do this by typing the following command at the Terminal.
airodump-ng wlan0
Again, use the wireless card interface name you acquired from Step 4 in replacement of wlan0.If the above command doesn’t work on you, try the following command:
airodump-ng mon0
Don’t forget to replace mon0 with the information you got from Step 5.
After placing the right command, you will see an assortment of wireless networks within your computer’s range. Select the WPA network you want to crack (preferably your home network) and copy its BSSID. You can find it on the far left and consists of a series of letters, numbers, and colons. An example of BSSID is 96:84:0D:DA:56:FD.
Remember: When choosing a network from the list, it should be either WPA or WPA2 as listed under the ENC column.
7.  Use Reaver to crack a network’s WPA password. On the Terminal, use the command below. Use the information you acquired from Steps 5 (monitor mode interface name) and 6 (BSSID) to replace the moninterface and bssid of the following command.
reaver -i moninterface -b bssid -vv
With the right information in place, it should look something like this:
reaver –i mon0 -b 96:84:0D:DA:56:FD –vv
Hit Enter and wait for the process to finish.
8.  Retrieve the WPA password. When Step 7 is done, look for the information listed beside WPA PSK. This is the WPA password. Here you can confirm if Reaver successfully cracked your home network.

How to protect your wireless home network from Reaver

Reaver attacks WPA and WPA2 protected networks by exploiting vulnerabilities in their WPS or Wi-Fi Protected Setup. With that in mind, you can use the following tips to protect your home network from Reaver.
1. Turn off your WPS. If the feature is present in your router, disabling it can help keep your network safe. Sad to say, this method doesn’t guarantee full protection. LinkSys and Cisco Valet routers remain vulnerable to Reaver attacks even if you disable their WPS. Use Reaver to check if your network is vulnerable even with WPS disabled. If turning it off does the job, then you don’t have to worry.
2. Opt for a router that doesn’t have WPS. If your network still keeps getting cracked by Reaver even with the WPS disabled, then get a router that doesn’t have this feature built-in.
3. Do your research. Perform an online check and find out what internet providers are servicing your area and what kind of routers they are supplying. If their routers have WPS, ask if you can switch to one that doesn’t have WPS for better security.

Comments

  1. Anonymous2:00 PM

    Shut the fuck up robert morrison

    ReplyDelete

Post a Comment

Popular posts from this blog

How to Hack a Website in Four Easy Steps

Every wondered how Anonymous and other hacktivists manage to steal the data or crash the servers of websites belonging to some of the world biggest organisations? Thanks to freely available online tools, hacking is no long the  preserve of geeks , so we've decided to show you how easy it is to do, in just four easy steps. Step 1: Identify your target While  Anonymous  and other online hacktivists may choose their targets in order to protest against perceived wrong-doing, for a beginner wanting to get the taste of success with their first hack, the best thing to do is to identify a any website which has a vulnerability. Recently a hacker posted a list of 5,000 websites online which were vulnerable to attack. How did he/she identify these websites? Well, the key to creating a list of websites which are likely to be more open to attack, is to carry out a search for what is called a Google Dork. Google Dorking , also known as Google Hacking, enables you find sen

How to Hack Facebook Password in 5 Ways

Check out the following post from  fonelovetz blog  on facebook account hacking. This is one of the most popular questions which I'm asked via my email.And today I'm going to solve this problem one it for all.Even though i have already written a few ways of hacking a facebook password.Looks like i got to tidy up the the stuff here.The first thing i want to tell is.You can not hack or crack a facebook password by a click of a button.That's totally impossible and if you find such tools on the internet then please don't waste your time by looking at them! They are all fake.Ok now let me tell you how to hack a facebook account. I'll be telling you 5 of the basic ways in which a beginner hacker would hack.They are: 1.Social Engineering 2.Keylogging 3.Reverting Password / Password Recovery Through Primary Email 4.Facebook Phishing Page/ Softwares 5.Stealers/RATS/Trojans I'll explain each of these one by one in brief.If you want to know more about them just

How to Hack Someone's Cell Phone to Steal Their Pictures

Do you ever wonder how all these celebrities continue to have their private photos spread all over the internet? While celebrities' phones and computers are forever vulnerable to attacks, the common folk must also be wary. No matter how careful you think you were went you sent those "candid" photos to your ex, with a little effort and access to public information, your pictures can be snagged, too. Here's how. Cloud Storage Apple's iCloud service provides a hassle free way to store and transfer photos and other media across multiple devices. While the commercial exemplifies the G-rated community of iPhone users, there are a bunch of non-soccer moms that use their iPhones in a more..."free spirited" mindset. With Photo Stream enabled (requires OS X Lion or later, iOS 5 or later), pictures taken on your iPhone go to directly to your computer and/or tablet, all while being stored in the cloud. If you think the cloud is safe, just ask Gizmodo

How to Hack Samsung Phone Screen Lock

I have discovered  another  security flaw in Samsung Android phones. It is possible to completely disable the lock screen and get access to any app - even when the phone is "securely" locked with a pattern, PIN, password, or face detection. Unlike another recently released flaw, this doesn't rely quite so heavily on ultra-precise timing. Video . Of course, if you are unable to download a screen unlocker, this security vulnerability still allows you to  dial any phone number and run any app ! HOWTO From the lock screen, hit the emergency call button. Dial a non-existent emergency services number - e.g. 0. Press the green dial icon. Dismiss the error message. Press the phone's back button. The app's screen will be briefly displayed. This is just about long enough to interact with the app. Using this, you can run and interact with any app / widget / settings menu. You can also use this to launch the dialler. From there, you can dial any phone