Wpa2 Hack Mac



Step By Step Hack WPA/WPA2 Wi Fi Passwords Using Aircrack Ng

In this tutorial I will tell you how to crack wpa/wpa2 wi-fi in kali linux using aircrack-ng. To do this, first you should install kalinux or you can use live kali linux.

To crack Wi-Fi, first, you need a computer with kali linux and a wireless card which supports monitor/injection mode. If your wireless card is not able to do this, you need to get an external wireless card which is capable of monitor/injection mode.

  1. The WPA2 encryption your Wi-Fi basestation uses isn’t as secure as you thought. Security researcher Mathy Vanhoef revealed a flaw that makes any WPA2 encrypted data on a WiFi network hackable.
  2. Understand when you can legally hack Wi-Fi. In most regions, the only time you can hack a WPA or WPA2 network is when the network either belongs to you or belongs to someone who has given you explicit consent to hack the network. Hacking networks that don't meet the above criteria is illegal, and may constitute a federal crime.
  3. WPA2 hacking (and hash cracking in general) is pretty resource intensive and time taking process. Now there are various different ways cracking of WPA2 can be done. But since WPA2 is a long shot, we shall first look at the process of capturing a handshake.

Apart from these tools, you need to have a word-list to crack the password from the captured packets.

The WPA2 password is blank. Did you try that?? Setup the password by using ethernet. This is often necessary because Apple make the airport utility do dumb things. With ethernet plugged in open the airport utility. Click on the airport extreme and click edit on the page that opens. Go to the wireless tab and set a WPA2 Personal password.

First you need to understand how Wi-Fi works. Wi-Fi transmits signal in the form of packets in air so we need to capture all the packets in air so we use airodump to dump all the packets in air .After that we should see that if any one is connected to the victim Wi-Fi. If anyone is not connected the Wi-Fi, cracking is not possible as we need a wpa handshake. We can capture handshake by sending deauthentication packets to client connected to Wi-Fi. Aircrack cracks the password.

Step-1:-

First open terminal. We need to know the name of the wireless adapter connected to the computer because computer has many adapters connected.

command for this is : iwconfig

In my case, my wireless adapter is with the name wlan0. In your case, it may be different. If connected to an external wireless card, it may be wlan1or2.

Step-2:-

For some wireless cards, it gives error messages to enable monitor mode on wireless cards. For that, you should use airmon-ng check kill.

Step-3:-

MacWifi

In this step, you need to enable the monitor mode on the wireless card. The command is as follows:

airmon-ng start wlan0 (interface of wireless card).

Now this command will enable the monitor mode on the wifi card. So while using interface in any terminal or command line use wlan0mon.

Note : You should use the interface which is indicated with red mark.

Step-4:-

We need to use the command airodump-ng wlan0mon, this will display all the access points in your surroundings and also the clients connected to that access points.

Now this command captures the packets in the air. This will gather data from the wireless packets in the air.

Note : Do not close this terminal. This will be used to know wpa has been captured or not.

Step-5:-

In this step we will add some parameters to airodump-ng.

command is : airodump-ng -c channel –bssid [bssid of wifi] -w [path to write the data of packets] wlan0mon[interface].

  • bssid − in my case bssid is indicated with red mark.
  • c − channel is the channel of victim wifi in my case it is 10(see in previous screenshot for channel number).

Wpa2 Hack Mac Download

  • w − It is used to write the captured data to a specified path in my case it is ‘/root/Desktop/hack

Interface in my case is wlan0mon.

In the above command the path /root/Desktop/hack hack is the name of the file to be saved.

Above command displays this terminal.

Step-6:-

In this step we deauthenticate the connected clients to the Wi-Fi.

The command is aireplay-ng –deauth 10 -a [router bssid] interface

In the above command it is optional to give the client mac address it is given by

This will disconnects the client from access point.

Screen shot of a client connected to access point.

After this the client tries to connect to the Wi-Fi again. At that time, we will capture the packets which sends from client. From this result, we will get wpa handshake.

Wpa2 Hack Kali

Step-7:-

Now we should start cracking the Wi-Fi with captured packets command for this is

path to word list in my case it is ‘/root/Desktop/wordlist.txt’

If you did not have word list, get one. If you want to generate your custom wordlist, you can visit our other post: How generate word list using crunch.

Kali

Wpa2 Hack Mac Password

Now press enter aircrack will start cracking the Wi-Fi.

Wpa2 Hack Mac Os

OK lets all take stock and use some logic here and I respectfully disagree with a few of the comments generally being banded about ! And i overall am unhappy about the general forum bashing as well as people may find a hint useful even though 'you' have not.
WPA-PSK / WPA2-PSK does not require an 'authentication server' per se as @leamanc has suggested.
Pre-Shared Key (PSK) Mode
The PSK mode is designed for home or small network use where an 802.1x authentication server isn't required. WPA-PSK works by regularly changing the automatic encryption keys authenticated between computers, your server or router and other devices that connect to it. PSK dramatically improves protection over WEP, as the encryption keys change very quickly, thus preventing intruders from gathering data to break encryption and into your network.
Now lets get to Encryption.....
WPA tends to use TKIP and WPA2 uses AES encryption.
Both these methods Apple call WPA Personal or WPA2 Personal.
AES is preferred as it is more secure and recent exploits of TKIP have led to it being slowly phased out just like WEP which should not be used at all.
However WPA works with most older hardware where as WPA2 will require more modern hardware (6 year old ish)
Overall with modern Wi-FI hardware using 'n' protocol you need to ONLY use WPA2 with AES encryption to get the best speeds/throughput. But that is another story.
I do not really want to go into WPA2 Enterprise, RADIUS, 802.1X etc as this is just going to make it even more complex for people to understand and irrelevant for Home users as this used when connecting to Business/Enterprise networks.