Skip to main content

how to crack wifi password using fern wifi cracker in securetecho



HOW TO HACK wifi USING fern wifi cracker

Step 1 –

 Go to Backtrack - Exploitation Tools - Wireless Exploitation Tools - WLAN Exploitation - Fern Wi-Fi Cracker. 

 Now following application will be seen.
                                   

Step 2 -

Now select the interface as wlan0 and Refresh it.  
Now click on “OK” after the box appears. 

 Step 3–  

Now click on “Scan for Access points” 

 Step 4 –

 After that it will show list of Detected signals 

 Step 5 –  

 Now click on WEP box 
                                
 Following screen will show like this. 

 Step 6 –

 Now choose the Attack option as you wish to do like, 
A. Arp Request Replay B. Chop Chop Attack 
(IN MY CASE I HAVE CHOOSEN “Arp Request Replay”) 
Now Click on “Attack” Button 

Step 7 –

 Now wait for its Attack functions like “Gathering Packets & Injecting Arp Packets” 


And at last KEY IS FOUND!!! 


      WITH THE WHOLE PRACTICAL WAY:   

            

          If you want to use another ways to hack something to go my another page:

                                               This is a link to go another page 

                     

Comments

Popular posts from this blog

Ethical hacking with full description in securetecho

                           ETHICAL HACKING Ethical hacking  refers to the act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious  hackers .  Ethical hacking  is also known as penetration testing. An  ethical  hacker is a computer and networking expert who systematically attempts to penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit. TOOLS FOR ETHICAL HACKING:               NMAP. Nmap stands for Network Mapper. ...     Metasploit. Metasploit is one of the most powerful exploit tools. ...     Burp Suit. Burp Suite is a popular platform that is widely used for performing security            testing ...

Concept of hacking,phases and its types in securetecho

1.3 Hacking Concepts, Types, and Phases in securetecho What is Hacking ? Hacking refers to exploiting system vulnerabilities and compromising security controls to gain unauthorized or inappropriate access to the system resources. It involves modifying system or application features to achieve a goal outside of the creator's original purpose. Hacking can be used to steal, pilfer, and redistribute intellectual property leading to business loss . Who is a Hacking ? Intelligent individuals with excellent computer skills, with the ability to create and explore into the computer's software and hardware. For some hackers, hacking is a hobby to see how many computers or networks they can compromise. Their intention can either be to gain knowledge or to poke around to do illegal things. Some do hacking with malicious intent behind their escapades, like stealing business data, credit card information, social security numbers, email passwords, etc. Hack...