Beini Hack Wireless

Source: Internet
Author: User
Tags nvidia video cards
Software introduction
When your laptop has a wireless card but can't access the Internet, you may be very anxious. Or maybe there is a time when you can connect to the wireless network next door, but you can't access the Internet because MI has a password. Now I will introduce a software that can surprise you. If you have a bottle, you can handle all the above questions! But first you need to prepare a U disk of no less than 30m and a U disk Creation + bottle + tutorial. The public can watch the video operation first to learn the small size of this software. With 600W dictionary file. For WPA, it's * *. Break - solve WEP, let alone. The speed is much faster than BT3 and BT4. First of all, BEINI supports injection attack, and the volume of software is very small and simple to carry. Now what we need is a U disk, no less than 128MB.
First of all, format it. Note that fat format must be selected, which must be remembered. Otherwise, there is no way to implement it continuously. After formatting, let's launch a defense against the surrounding routers. Nicknamed "milk bottle", the Linux system milk bottle is a system that I believe all partners playing wireless should know. This is a wireless network security testing system based on tiny core Linux. Of course, because it is used for security testing, it has powerful functions in security. Moreover, this system is very simple and easy to learn, so now it gradually replaces BT3, BT4 and other tools, and gradually becomes the mainstream system of wireless network security research. Today, we will use this system to complete the following tasks. Page 2: compared with other systems, the biggest advantage of "milk bottle" is that it is easy to operate and understand, but it also has a high success rate.
The downloaded "baby bottle" system is an. ISO file, and the size is only about 40MB, so we can use the image software to write it to the U disk. Here, we use the software of ultraso, which is much easier to understand than other similar software.
However, after choosing to write directly at any time, the computer can not successfully start the "bottle" from the U disk. Therefore, if the building is not successful, we still need to select Manual Loading guide file.
We first need to unpack the. ISO file of the downloaded "milk bottle", then find the boot file in the directory as shown in the figure above, and then load it, and then write the U disk. Page 3: access to the "bottle" system
After restarting the computer, press the Del key to enter the BIOS configuration interface. Here, we need to choose to start from the U disk to let the computer start from the "bottle" system.
If you can see the above picture, the U disk boot disk is successfully created. In a moment, we can enter the "bottle".
Page 4: scanning network signal is usually around us, and many routers are on at the same time, so our computer will also display multiple connection signals. Searching for these signals on the "bottle" is a very simple thing.
After clicking the "bottle" icon, the system will pop up the above interface. Click Yes here to start the network signal scanning.
First of all, we will talk about the client, which means that the scanned router is discussing the client's access to the Internet, so we can attack it completely. As for the situation that only signals are needed but no clients are online, we will take time to discuss it in the future. Attention of the public: since the WEP encryption form was completely broken before, the network signals that my community can receive are basically in the form of WAP / wap2. In this regard, the public has done a good job. However, WAP / wap2 is not completely safe. Let's keep looking down. Of course, when there are clients, they are still very simple. If there is no client, I can't remember what netizen said: "a hunter who doesn't have the patience to wait for his prey is not a good hunter." This is a good word. I believe it will be fruitful to choose the evening to wait. Page 5: handshake packet. Let's see what handshake packet is. Handshake packet is a packet that implements information matching and verification between network card and router. In this packet, there will be password information of wireless network. Therefore, we only need to grab the handshake packet of the other network, so breaking and decrypting the password is just a question of time.
After scanning, we can click the next button to enter the packet capturing interface. The client MAC in the upper right corner of the figure is the MAC address of the client we are going to implement packet capturing. Click the start button, let's start to grab the bag.
Before grabbing the bag, hang up the password dictionary first, and then you can directly break it
After clicking on the "depth", the system will launch an attack on the other client, forcing the other client and the router to disconnect. When the other party's network link is broken, the router and the client will send each other handshake packets, which is exactly what we need. The speed of grabbing the handshake packet depends on the distance between us and the other router and AP. The stronger the signal is, the faster the grabbing is successful. Otherwise, the slower the packet is, or even the packet cannot be grabbed.
In general, we can't use the dictionary we brought with the "milk bottle" to solve the seized handshake bag. Therefore, we also need to export the handshake package, take it to the windows system, and use another violent software to break the solution. Page 6: because the "milk bottle" is a Linux system, the storage mode and operation mode of the file are different from our daily operation methods.
Rox filer is equivalent to "my computer"
After the Rox filer is opened, click the green arrow in the upper left corner, and then enter the MNT directory, you can see the hard disk list in the above figure. It's just that there's no clear drive letter, so we need to try one by one before we can determine which drive these icons correspond to.
The operation mode of the file is the same as that under windows, and the address of the handshake package we grab is: Rox filer / TMP / feedingbullet / start / xxxxx.cap the handshake package file is suffixed with. Cap.
We can import the handshake package into the U disk or put it directly into the windows system folder. Then, we will restart the computer and enter windows. Another leading actor will appear. Page 7: ewsa brute force break machine, finally back to the familiar windows, let's invite another star, this is Elcomsoft Wireless Security Auditor from Russia, or ewsa for short.
This software claims to be able to use GPU computing function to break wireless network password at high speed. Compared with CPU, the computing speed can be improved by up to a hundred times. It works in a very simple way, that is to use the dictionary to solve the WPA and WPA2 passwords on the wireless AP. It also supports 12 variable settings, such as letter case, number substitution, symbol order transformation, abbreviation, vowel substitution, etc., which can be used on ATI and NVIDIA video cards.
A good dictionary file is a must if you want to break and untie your handbag smoothly. Fortunately, there are many excellent dictionary files on the current network, so we have a variety of choices in the break solution time. But in summary, these dictionary documents are nothing more than the following: birthday, word, rare person name, anniversary, number. Therefore, as long as we can bypass the scope of these dictionary files at the time of password configuration, our network security will be greatly improved.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.