You can also

Source: Internet
Author: User

Introduction

In the eyes of ordinary people, rub is a very advanced technical activity. It is always difficult and difficult to do. I have lost my mind before I started learning it. In fact, it is too simple. It is no exaggeration to say that, as long as you have basic windows operations, it is not a dream to learn to stick to the internet!

 

Basic knowledge

We also popularized the basic knowledge before the network!

Wireless Network Card and wireless network card

Although there is only one more word, it is actually two completely different concepts.

A wireless network adapter is a type of network adapter that can be connected to a wireless network. The network adapter is divided into two types: wired and wireless (I know, it is connected through a wireless network card. Generally, a laptop has a wireless network card. For example, my laptop comes with one.

 

This wireless network card is built in the notebook. There is also a wireless network interface, which is a USB interface, of course, can be connected to any support USB interface. From the above we can see that desktop computers can also use such wireless network cards to connect to Wi-Fi wireless networks. Do not think that wireless networks only exist in mobile phones and laptops. This type of USB wireless Nic is not very expensive. If you like the network, you 'd better buy one, or buy one with an antenna, so the signal is stronger. If you have any requirements, you can go online to learn more. I will not go into details here.

 

 

 

Is the USB wireless network card I am using

A wireless network adapter is a type of card launched by a carrier to connect to the carrier's wireless network. Generally, it can be divided into package traffic and package time. For details about the package, refer to the official website of a carrier. If you are interested, you can go to the website of each carrier to learn more.

 

Is a common wireless network card

BT, CDLINUX, and chubby

These are actually some releases of Linux, such as RedHat, CentOS, Fedora, and Ubuntu. The lower layer is Linux, but these are not the same as normal Linux, and many hack tools are closed in it. If you are interested in hack, it is necessary to study it in depth. Of course, there are our network tools here. This tutorial uses CDLINUX, and the other two are also available. If you are interested, you can download them and study them. Some online sellers always use virtual built-in cracking software to crack the XXX and XXXX encrypted networks. The wireless networks in one community are exhausted. In fact, they are all bragging about B. Don't trust me. Also, BT9 and BT10 are too powerful. I can only say that they do not know what these are. If you are interested, you can go to the official BT website to check them, now BT is just a few times. I really don't know how many sellers can blow.

Virtual Machine

If you want to believe this, you should be familiar with it. If you are not familiar with it, there is nothing terrible. I will explain it to you in detail. To put it bluntly, the function of a virtual machine is to allow you to run multiple operating systems simultaneously on one computer. For example, I am running Windows 7, but I want to run another CDLINUX to crack the wireless network. (Note that CDLINUX is a system software and an operating system, the current solution is to run the system only using virtual machines. Of course, you can also record CDLINUX as a CD, and then restart the computer to start from the CD. You can also run CDLINUX, but your win7 won't run. Therefore, a virtual machine is a software that allows you to run multiple operating systems at the same time. Currently, vmware workstation is widely used, and other virtual machine software is available. Depending on your personal interests, you can decide which one to run.

Tools used:

  • Cdlinux
  • Wireless Network Card
  • Vmware workstation 9.0

 

Startup

If you have basic knowledge, let's start it.

Prepare a VM

There are too many tutorials for installing virtual machines on the Internet. In fact, the installation is too simple. The next step is to complete. There is no need to describe them in detail. I will install them all.

Prepare CDLINUX

There are also a lot of images on the Internet, and I believe in your strength. Try to find it by yourself. If you cannot find it, leave a message below and I will help you find it.

Create a VM and start CDLINUX

VMware workstation 9

I don't have much to worry about here. You just need to repeat the points I circled.

 

Select the ISO for the downloaded CDLINUX

Select Linux and other2.6x

 

 

 

 

 

 

 

 

Make sure that the vmware USB service on your real machine is enabled.

 

 

Click Start to start

 

After the startup is complete, set the USB wireless Nic to be connected to the Virtual Machine

After the above configuration is complete, we can start network farming.If you burn CDLINUX into a CD and start the system from the CD, the above steps can be omitted.Before you engrave the CD,One thing you need to determine is that CDLINUX does not support your laptop wireless network card. If it does not, you will not be able to find the wireless network card of your laptop, so you still cannot crack it.Therefore, the best way is to directly build a USB wireless network card, you can listen to music, watch movies, play games, while cracking the password, what a wonderful thing. Before buying a USB wireless network card, check whether CDLINUX supports this function. If you are interested in this list on the internet, you will not detail it here, which is too troublesome.

 

Open

 

All the three circled above can be used to crack the wireless connection. I will use the first one here.

First, open it in the same way as the windows program. Simply double-click it.

 

First, we will see a warning message, which also explains what we should do to ensure the security of our wireless network. This is a classic summary. However, too few people do not know what WPS is.

Ignore this warning and click OK to access the software.

 

The interface functions have been clearly stated. We can directly scan and start scanning.

 

Yes Scanning

 

WEP encryption is not supported. If WEP is encrypted, you can select one and click Start.

The key to WEP cracking is described below.

1. You must have a client, that is, the wireless network you selected. Someone needs to access the Internet.

2. The best thing is that someone is downloading a large number of items on the wireless network card you selected, which will cause faster cracking.

3. If there is no client, the attack will be very slow. You just need to wait and wait for it to access the Internet and there will be traffic to crack it. If you cannot wait, use another software. The bottle is suitable for cracking without clients, but it may be a little troublesome.

4. I used to crack a wireless network. The WEP is encrypted. The password is a 17-digit combination of uppercase and lowercase letters. It took less than five minutes to get the password.

5. When you crack the password, if the wireless router of the cracked network is not good, the router may crash. Therefore, if you find that your wireless router Often crashes unexpectedly, maybe your wireless network is being cracked by someone else.

6. Be patient when cracking. The strength and weakness of the signal also have a great relationship. If the signal is good, it is generally easier to crack. If the signal is poor, it will be more difficult to crack, you can change your notebook to see how to put it, and the signal can be the best. Of course, the external signal amplification tool is the best choice. If you love it very much, I like breaking others' networks very much. Buy one online and enlarge the signal. Basically, the signal of a community can be exhausted all over the Internet.

 

Because I do not have WEP here. If it is the easiest option, simply select and start waiting for the password to exit.

So I am cracking WPA2.

 

Change the encryption method to WPA/WPA2 on the right and select a wireless network.Reaver: This is our tool for cracking WPA2. wps is carried behind the wireless network. It can be cracked in general. Without wps, it may not work.This suffix is used to determine whether the vro has enabled wps. If it is not enabled, just give up. packet capture is acceptable, but the dictionary is needed to run the package, depending on luck. We will not talk about this here.

In fact, reaver cracking is what we usually call PIN cracking. It can enumerate the vropin PIN code. The PIN is composed of eight pure digits, which are also divided into the first four digits, the last three digits and the last one. During the cracking, the first four digits are enumerated. If the first four digits are enumerated, the progress will jump directly to 90%, and then the last three digits are enumerated, the last digit is the verification code, and it will soon be done. Therefore, there are a total of 11000 possible PIN codes. This kind of cracking is very fast. Lucky people break the code in seconds. As long as the PIN code comes out, the password will come out. Therefore, after cracking the PIN code, remember to use the PIN code to crack the password next time, and the password will soon be cracked.

Here I select the wireless network 364u

 

The above is the reaver parameter. Use the default value. If you want to view all the parameters, open the terminal and use reaver-h.

 

Click OK to start cracking. For example, the following is the process of cracking. It takes a long time to complete. The final result is displayed.

 

After a long wait, the password is displayed !!!

 

Wps pin is the vropin's PIN code. If the password is changed, you can use this PIN code to get the password directly.

Wpa psk is the key, that is, the password of the wireless network.

The SSID is the wireless name.

Ap mac is the MAC address of the wireless router.

The last step is to tell you where to back up the above results

 

Now we can connect to the network we just cracked and try our luck to see if we can log on to the management interface.

 

 

Telecom routers suddenly fell out of interest, and all the attacks were abnormal. That's it! If you don't know where it is, please reply or email below!

 

Defense Measures
  • Set a complex password. uppercase/lowercase numbers and special characters are added.
  • Change the default username, password, and port used to log on to the vro.
  • Change the default vro192.168.192.168.0.1
  • Disable the DHCP server and use a static IP address.
  • Bind a MAC address and IP address to prevent ARP attacks.
  • Disable vro WPS
  • You have several settings to access the Internet. For example, if there are only two internet devices, only two IP addresses are enabled. All other IP addresses are not allowed.
  • Use WPA2 Encryption

If you have done the above measures, he will still be able to rub your network. Congratulations, you have met a great god, so let it rub off. It's hard to meet God.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.