Wifislax Many cracked WiFi password tool, the following is said inside of the Linset software fishing process, many people know this method, but no summary, YouTube video A lot, I just tested a, or intend to record the attack process:
First you need a wifislax system, see my pinned article: http://www.cnblogs.com/shenjieblog/p/5138846.html
Start entering Wifislax, and then open Linset.
Then in the interface will display your available network card, which is also my USB flash drive to start the Wifislax system, that is, only U-disk startup Wifislax to identify your network card, if the virtual machine may need a specific model of the external wireless network card support, it is troublesome, or there is no network card support, You can't use this tool to hack it. As follows: Identification of my available network card only one, we enter "1" after the return.
Then, enter "1" as follows.
It will then automatically pop up an interface to scan the WiFi signal, as shown below, with some WiFi names on the right.
Then scan for a period of time (for example, 30 seconds) and then manually press CTRL + C to stop the scan, and then the next screen will display the WiFi name you just scanned.
Did you see it? The best Wi-Fi with an asterisk on the left is the WiFi that we can go fishing on, with an asterisk on the client side, which means someone is surfing the internet. We don't have to think about it without an asterisk. Enter the number that we want to fish in front of the WiFi, for example, I want to crack the WiFi named S, so enter "3", and then return.
Then enter the "1" carriage return.
Press the "Enter" key and then enter.
Then enter the "1" carriage return.
Then enter "1" carriage return, and then will start to grab the handshake package, the handshake package is someone else on the internet sent out of the packet, which contains a lot of information, which has wifi password, but it is definitely added a secret, we usually get to the handshake package after a lot of people are using the dictionary to brute Force, But I do not like this method, first if you want to crack success, you need a strong dictionary, and then brute force to break the CPU, you will be able to hear the computer fan rotation sound, so if you can fish is convenient, then how to use the handshake when fishing? We get to the handshake packet and then a phishing attack, the principle of phishing attack is to be virtual (generated) and you want to attack the WiFi name of the same Wi-Fi, but the difference is that the new generated WiFi is not with the password, easy to be the fisherman can easily connect, After the attack began to attack the user's device (computer or mobile phone) will automatically go offline (keep dropping), and then automatically connect to our virtual out of the same name of the WiFi, this time even if the attacker and reconnect to their own that with the password of the WiFi will continue to drop the line and not on the net, Then connected to our virtual out of the WiFi will be automatically (or by the attacker's own manual) to open the browser, and pop-up wifislax inside the Linset tool in the default fishing page, is actually a Web page, there will be a prompt to enter the WiFi password input box, When the attacker entered the WiFi password, the password will be the handshake package inside the WiFi password to match the comparison, if the WiFi password will immediately pop up to crack the WiFi password, if not the same words will prompt the password error, request to be re-entered by the attacker. Of course, many wise men are not fooled.
If the WPA handshake in the red box appears, we have grabbed the handshake packet.
Then we can press CTRL + C to stop the crawl at this interface. Then it will appear:
Then enter the "1" carriage return.
Then enter the "1" carriage return.
Then enter the "1" carriage return. Go fishing, the next is a long wait, we wait for the fish to bait.
The upper left corner is the DCHP Message display window, the upper right corner is the client display window that is caught, you will see the number of clients (devices) connected to the WiFi, the IP address of the connecting device will be displayed, the lower left corner is the URL of the Web site that the attacker visited, and the lower right corner is the window to attack the wireless. Causes the client under that AP to connect to the forged AP that we set up conveniently.
Then, when the attacker is connected to our bogus WiFi, the Phishing page will automatically pop up, as follows:
Prompts the attacker to enter the WiFi password. If you enter an error, you are prompted with an error message.
If the input is correct, the password pops up immediately.
The password is 88888888 and will automatically save the password in the system, with the following path:
That's OK.
Another need to note is that the choice of AP fishing to use more than the number of points, so it is easy to take the bait, and the time of the fishing as far as possible to choose the evening when everyone off work, this time is the peak of the Internet, only fish, otherwise fish is not to wait for a long time oh.
Linset Software Fishing Tutorials in Wifislax