Photo name: Select Chinese here. Do you know?
Start the system and select the language interface. Here you choose Chinese. If you are a foreigner and select a foreign language, I believe you are Chinese here?
VM startup ing
It is exciting to start.
Hey
Next
Step 2: crack wep/wpa2
1. The system is started. This is the desktop! What? Familiar with it? Like win! Easy to use
2. Open the first software minidwep-gtk ~~ in the second row ~~ In this dialog box, click OK! It's over.
3. Check the drop-down menu in the upper left corner and find your Nic !!! Then, in the upper right corner !! Scan! L start! Then we started to get excited !~
4. Are you excited? No?
Sssid --- scan the mac address pwr: signal strength data of the wireless access point. This is the essid at the end of the so-called data packet? That is the route name you have scanned! In this way, the rabbit artifact tax sankang plays tricks and throws the curtain of the screen, and the sheath is "sang", and the slice is flat: accounts and posts are flat and Wu Ke said so cut Ji NJI Kang model slow Yang Xi car account vocational school charge painted Pingyi Bo? Br/>
5. How is it? Hey, you see it? The software has found the vro encrypted in wpa2! Of course, the search method of the software is to search together, that is, wep and wpa2. Let's see the "encryption method" on the Left bar of the software. If you select wep, the wep-encrypted route is displayed, if you select wpa2, The wpa2-encrypted route will be displayed. Here we will talk about cracking the wpa2-encrypted route! That's why wep was taken! If you are cracking the wep route, click the "Start" button on the right bar, And the rest do not need to automatically search for the password (the premise is that there are packets !)
6. Capture the handshake package, read the last line of the image, and capture a handshake package. The handshake package is waiting for authentication. You will be prompted after authentication! Tell you have caught a handshake package and you can crack it! (Of course, it takes patience to capture the handshake package. Sometimes the rp may surge and I will catch it after 10 minutes)
7. Basically, it has been successful, and the rest is cracking! Start to crack the first part, run the package, and test the password!
8. Next, contribute your dictionary to minidwep-gtk! Hey, will this happen? I will give him a dictionary and the last wordlist.txt. You can select a dictionary based on the actual situation. In fact, I have stored more than 3G dictionaries! Hey, but this route is weak! So this dictionary is enough!
9. decrypt it now. It's successful !!! Hey, haha !!! We can see wpakey: 0123456789. This is the password! What is the password? Is it mentally retarded ?! Hahaha