Neighbor’s wi-fi hacking / Airslax

Neighbor’s wi-fi hacking / Airslax

Neighbor’s wi-fi hacking

Maybe someone will be interested in the topic. If you don’t know much about Kali linux, then this method will be just gorgeous for you.
One of the items is to download AirSlax and create a download stick. The utility interface offers graphical options.

SPOILER

Hidden content for authorized users.

The first priority before installing AirSlax is to download the ISO image of the program. You can do it for free right from our portal. then the second necessary action is to change the boot device in BIOS.
The software loader provides maximum
automation. To make the USB flash drive system, just follow simple AirSlax installation instructions:

  • Place a USB device in the appropriate computer port
  • Unpack the installation package on a mobile medium;
  • Go to the “boot” directory;
  • Run the appropriate installer, the folder contains two files for Windows and Linux.
  • In the window that appears, press any key or “x” to stop the process.
  • After the restart, install a USB HDD download in BIOS.

Program Menu: q1) Scan – Scan

ether q2) Choice –

Select Target q 3)

Intercept – Target Intercept q

4) Customer – Disable Customer

q 5) Rebound –

WPA Password Pick – Save –

Save – Save

the result WEP – WEP Password

Selection ( ———————- q 8) WPS

Scan – Scan

WPS 9) WPS Selection – WPS PIN selection q ———————- q 10) Automatic. – Auto-picking

and interception 1)

Scan – Scan ether Scans all wifi channels, saves information about all visible access points and connected customers (customer information is needed to speed up the interception process).
The top of the list is also the access points, the bottom – customers connected to the hotspots.
In the customer list the first column – MAS address the point to

which then the client is connected (it coincides with the MAS in the list of access points) give the program time to accumulate more information.
Close this window and move on to the next point.
2) Choice –

Choose a target Selecting an access point for the attack and also one of the customers connected to
it. 3) Intercept –

Intercept the target Intercept packages going to/from the selected access point, waiting for the

appearance of the handshack (in the upper right corner of the window should appear the inscription “WPA HANDSHAKE”) Do not close this window before holding the next item!

4) Customer –

Disconnect the client because the handsshake passes only at the moment of connection of the client to the access point, help the client to disconnect from the access point, so that he can then reconnect to it and give us a hand-neck, p.3 “The Intercept” should be launched at the same
time.
If the handler does not appear the first time, try several times (but give

the customer 30-120 seconds to try to connect) if this client does not work, you can choose another through p.2 “Choice” (but choose the tight access point, the interception of which you lead), the interception can not stop.
You can also choose n.” Disconnecting all” – not as effective as with one client, but sometimes triggers.
if nothing helps to knock the customer out of the network, but really want to catch a hands-on, you can leave the interception running until the customer himself does not connect to the access point.
after p.4, you can try to conduct p.5 “Hacking” because “The Intercept” does not always clearly define the appearance of the handshack, especially if the signal of the access point or the customer is not very good. 5) Selection – Choosing

a WPA password When the handler is caught, you can go to the selection of the password by dictionary (a small

dictionary is included, you can use your dictionary, put it in the folder “slax”dict) In case of successful selection will be the inscription KEY FOUND!

[ password ] (in brackets instead of “password” will show the password). also If the password is not picked up, passphrase does not appear in dictionary.
If also the selection has not been successful contact here WiFi password selection, here will help you! 6) Save –

Save the result Save the result

Of the interception for further work with it in a separate folder (on the flash drive folder “dump” result) the file will be called by the name of the access point with the expansion .cap and will be cleared of excess debris accumulated during the interception process.

7) WEP – Wep

Password Selection Hacking Networks with WEP
Encryption. You also need to complete the first three points of the program, leave the Intercept running and run P.7 WEP. Hacking WEP takes an average of 5-10 minutes.also He doesn’t need dictionaries. also If you successfully carry out an attack, the password is selected 100% of the time.
8) Scan WPS –

Scan WPS Search points supporting authorization under WPS
protocol.
9) WPS Selection – Matching

the WPS PIN, select the access point from the list and select the
PIN. The selection process is long, from 2-3 hours to several days, depends on the “collusion” of the access point, but allows you to open passwords of any complexity.

Automatic. – Auto-picking

and interception Automatic search, then interception of WPA hand-necks, selection of WEP-networks passwords.
Try not to abuse this function, because it is pretty much littered on the air.

Leave a Reply