Kismac with an HWUG1 Wireless-G USB Adaptor
(mac only)
Recently purchased(from amazon) a Hawking Technology G adaptor to test with Kismac. Using this youtube video tutorial:
http://www.youtube.com/watch?v=lBGN5OGCPgI
What I learned from this exercise is that the only way to crack WPA and WPA2 is via bruteforce/wordlist. I have gather some over the internet and I believe that you can produce some with Cain and Able, more details coming in the next post.
Here are some basic word list:
http://rapidshare.com/files/429043935/500_most_used_pswd.txt.zip
http://rapidshare.com/files/429045186/Rockyou_list_original_.txt.zip
more from kismac: http://trac.kismac-ng.org/wiki/wordlists
Cracking WEP is much more easier specially with the HWUG1 card which can perform injection. You acn successfully retrive the key with these easy steps:
- Select the RT73 device driver in preference, remove the airport drivers.
- Scan/sniff the network
- Then under preference select the channel which the SSID in interest sits on,
- Click on reinject packets and wait until ~130,000 packets have been gathered.
- After 130,000 or so have been gathered click on network →crack →Weak Scheduling Attack →Both
- The Key should be cracked in a matter of minutes (works for me if stuck email me)
Hope this quick guide helps, working on one for the WPA encryption.
dumb disclamer: This is not a toy dont break/crack networks that are not yours, im not responsible for anything done with this tutorial/tools