Kali Linux Tutorial – Tutorialspoint

In this chapter, we will learn how to use the Wi-Fi cracking tools that Kali Linux has incorporated. However, it is important that the wireless card has a supported monitoring mode.

Fern Wifi

Cracker Fern Wifi

cracker is one of the tools that Kali has to crack wireless

.

Before opening Fern, we need to convert the wireless card into monitoring mode. To do this, type “airmon-ng start wlan-0″ in the terminal.

Airmon NgNow, open Fern Wireless Cracker. Step

1 – Applications → Click on “Wireless Attacks” → “

Fern Wireless Cracker”. <img src="https://www.tutorialspoint.com/kali_linux/images/fern_wireless_cracker.jpg" alt="

Fern Wireless Cracker

” />

Step 2 − Select the wireless card as shown in the screenshot below.

Wireless CardStep

3 − Click “Search for Access Points

“. Access Point

Step 4 – After finishing the scan, it will display all found wireless networks. In this case, only “WPA networks” were found.

WPA Network

Step 5 − Click WPA Networks as shown in the screenshot above. Displays all wireless found. Generally, in WPA networks, it performs dictionary attacks as such.

Step 6 – Click on “Browse” and find the list of words to use for the attack.

WordlistStep

7 − Click “Wi-Fi attack”.

Wifi Attack

Step 8 – After finishing the dictionary attack, it found the password and it will be displayed as shown in the following screenshot image.

Dictionary AttackKismet

Kismet

is a WIFI network analysis tool. It is a layer 2 802.11 wireless network detector, sniffer and intrusion detection system. It will work with any wireless card that supports raw monitoring mode (rfmon) and can sniff out 802.11a/b/g/n traffic. It identifies networks by collecting packets and also hidden networks.

To use it, convert the wireless card into monitoring mode and to do this, type “airmon-ng start wlan-0″ in the terminal.

Start Wlan

Let’s learn how to use this tool.

Step

1 – To launch it, open the terminal and type “kismet

“. LaunchStep

2 − Click “OK”.

Kismet

Step 3 − Click “Yes” when prompted to start Kismet Server. Otherwise, it will stop working.

Start Server

Step 4 − Startup options, leave as default. Click “Start”.

Leave Default

Step 5 − It will now display a table asking you to define the wireless card. In this case, click Yes.

Set Table

Step 6 − In this case, the wireless source is “wlan0”. It will have to be typed in the “Intf” section → click “Add”.

Wirless SourceStep

7 − It will start sniffing wifi networks

as shown in the screenshot below. Networking

Step 8 − Click on any network, produce the wireless details as shown in the following screenshot.

Wireless Network

GISKismet

GISKismet is a wireless visualization tool to represent the data collected using Kismet in a practical way. GISKismet stores the information in a database so that we can query data and generate graphs using SQL. GISKismet currently uses SQLite for database and GoogleEarth/KML files for graphics.

Let’s learn how to use this tool.

Step 1 – To open GISKismet, go to: Applications → Click on “Wireless Attacks” → giskismet.

Giskismet

As you will recall in the previous section, we used the Kismet tool to explore data about wireless networks and all these Kismet data packets in

netXML files.

Step 2 – To import this file to Giskismet, type “root&commat;kali:~# giskismet -x Kismetfilename.netxml” and it will start importing the files.

Importing files

Once imported, we can import them into Google Earth the Hotspots we found before

.

Step 3 – Assuming we have already installed Google Earth, we click File → Open file that Giskismet created → Click “Open”.

Google Earth

The following map will be displayed.

MapGhost Phisher Ghost Phisher

is a popular tool that helps create fake wireless access points and then create Man-in-The-Middle-Attack.

Step

1 – To open it, click on Applications → wireless attacks → “phantom phishing”.

<img src="https://www.tutorialspoint.com/kali_linux/images/ghost_phisher.jpg" alt="

Ghost Phisher

” />

Step 2 − After opening it, we will set up the fake AP using the following details.

  • Wireless interface input: wlan0
  • SSID: Wireless AP name
  • IP address: IP that the

  • AP
  • will have WAP: Password that this SSID will have to connect

Opening Ghost Phisher

Step 3 – Click the Start button

. Wifite

is another wireless clacking tool, which attacks multiple WEP, WPA, and WPS encrypted networks in a row

.

First of all, the wireless card has to be in the monitoring mode

. Step

1 – To open it, go to Applications → Wireless Attack →

Wifite. WifiteStep 2 − Type “

wifite

-showb” to search for the networks. <img src="https://www.tutorialspoint.com/kali_linux/images/wifite_showb.jpg" alt="

Wifite Showb” /> Scan NetworkStep 3 − To start attacking wireless networks, click Ctrl + C. Step 4 – Type “1”

to decrypt the First Wireless Connection.

Crack First

Step 5 − Once the attack is complete, the key will be found.

Key Found

Contact US