Posts

Showing posts with the label wifi penetration

Airgeddon framework

Image
POC OF AIRGEDDON FRAMEWORK Introduction:- Airgeddon is a automated tools by which we can crack wifi password. Lab environment:- Atacker’s Operating system:-linux kali 4.13.0-kali-amd64 Wifi adapter:-TP-Link TL-WN727N 150Mbps Wireless N USB Adapter Framework:- airgeddon Step 1:- Copy the github link( https://github.com/v1s1t0r1sh3r3/airgeddon ) and clone it in the desktop. Step 2:- Then i check the permission of all the file inside the airgedden i found that airgedden is not a executable file. Step 3:- Then change the permission of airgeddon.sh form -rw-r--r-- to -rwxrwxrwx by typing chmod 777 airgeddon.sh Step 4:- Connect wifi adoptar and Run airgeddon.sh.We have the framework in front of us. Step 5:- Then check the requirement what this script need for running this script.there is some error show in this script but we don't want any package for cracking the password so hit enter do ahead. Step 6:- Then select the interface to work wit...

POC OF WIFITE 2

Image
POC OF WIFITE 2 Introduction:- Wifite version 2 is a automated tools by which we can crack wifi password. Lab environment:- Atacker’s Operating system:-linux kali 4.13.0-kali-amd64 Wifi adapter:-TP-Link TL-WN727N 150Mbps Wireless N USB Adapter Framework:- wifite version 2 Step 1:- Plug the wifi adapter. Open the wifite version 2 framework then we have a screen like given below. Step 2:- Then this framework automatically start the monitoring access points which is within the range of the adapter.then we have list of all the access point which is listed below.   Step 3:- Then stop the scanning by CTRL+C and set the target i set the target no. 1 after set the target this tools sending the deauthentication packets to the clients of the access point after disconnect the client. Client automatically reconnect to the access point when the client reconnect the access point this tools capture the  handshake and save in default destination in root ....