Remember that they may not always work with you in the first time ,especially if you’re using VirtualBox or VMware. Which led to a lot of issues, so I highly recommend installing Kali Linux on your local system , specially if you don’t have a good adapter.
The first step is to put your adapter on your machine and use this command to confirm its successful connection lsusb
.
2-Second part, We need to terminate some processes to ensure that nothing is obstructing airmon-ng check kill
. Then we are going to start the monitor mode , Which allowing the system to listen to every packet around us airmon-ng start <name of your adapter>
Press enter or click to view image in full size
3.Third part, to check everything is fain we will useairodump-ng <name of your adapter>
To determine if we can capture any access points (APs) with our adapter.
Note: may will not work with you in the first time; the hacking is not like YouTube. Sometimes you need to restart your machine and try again and again.
Press enter or click to view image in full size
4.Forth step, At this point, all you need to do is run wifite
. The tool will analyze the network, attempt the relevant attacks against the access point, and present the results — saving you the effort of running each attack manually. sudo wifite -i <name your adapter>
Click Ctrl+C to start then select your target.
Note: You will see alerts with “ are missing some tools”
Don’t worry, we won’t be using these types of attacks in this tutorial — as I mentioned earlier. I hope you’ve already checked out my previous article, because the two are connected. Both tutorials rely on the 3-way handshake method to attack the access point, and I had already covered the details.
After you select you target , will start spreated attacks step by step .
The first attack Wifite tries is the WPS Pixie-Dust / PIN attack. This method is very rare to succeed today, since you’ll almost never see it except on very old routers.
The second attack is the Handshake Capture Attack. Here, Wifite sends deauthentication requests to connected clients, forcing them to reconnect. During that process, it captures the encrypted handshake, which contains the data we can later brute-force to recover the Wi-Fi password.
There are also some extra attack options available, but we’ll save those for a future discussion. For now, let’s go ahead, pick our target, and see what results we get.
Press enter or click to view image in full size
After that, Wifite will start the brute-force process. By default, it uses its built-in wordlist, but you can easily add your own. Just include the path to your wordlist in the command you ran earlier, and Wifite will use it.
You can also use the --crack
option to specify a custom wordlist. For example:
wifite — crack /home/gmm/passwords/wordlists.txt`
the result:
Press enter or click to view image in full size