how to install cowpatty in ubuntu

Namaste Hackers,



Today, Here i am going to write about how to install CowPatty Offline WPA2-PSK Password Cracker With GenPmk In Ubuntu.


Introduction

Q 1. What Is Cowpatty?

Ans. Cowpatty is One type Of Cracking Software that Allow us to implement brute force attacks against WPA/WPA2-PSK 4 Way Handshake files. In Simple Words, This Software Can Crack Password From WPA/WPA2 Handshake File Using Dictonery.

Q 2. What Is GenPMK?

Ans. Although Cracking WPA/WPA2 Password From Handshake file is Very Slow Process Even With CowPatty Or Aircrack-ng. So, To Increase The Speed Of Cracking, Their Is A Simple And Effect way is to use genpmk. GenPMK comes with cowpatty, actually genpmk is also a part of Cowpatty. With The Help of genpmk we can generate Pre-Calculated hash file for rapid password cracking and this pre-calculated hash file can amazingly boost our cracking process.

To Install Cowpatty And Genpmk In Ubuntu. Follow Below Steps.

Open a terminal and type 


Step 1.


:~# cd Desktop/

Step 2.


:~# sudo apt-get install libpcap-dev libssl-dev

Step 3.


:~# wget http://www.willhackforsushi.com/code/cowpatty/4.6/cowpatty-4.6.tgz

Step 4.


:~# tar zxfv cowpatty-4.6.tgz

Step 5.


:~# cd cowpatty-4.6

Step 6.

:~# make cowpatty

Step 7.

:~# sudo make install -d /usr/local/bin



ScreenShot




Done!

Written By
            SSB  

How To Hack WI-FI Password Using Aircrack-ng And Kali Linux

Namaste Hackers,



Today, I Am Going To Show You How To Crack WPA/WPA2 Wireless Encryptions Using Kali Linux And Aircrack-ng suite.

In Order to Crack Any WPA/WPA2 Wireless Encryption Without trying password directly against access point for hours of hours. We Can Use 4 Way Handshake Packets. 4 Way Handshake is a Process To Identify Clients Real Identities And Also To Exchange Their Pre-shared Keys , Responsible To Make Encrypted Connection Between Client And Access Point. So, Basically, We Will Try To Capture 4 Way Handshake Packets Of Target Access Point And Then We Can Directly Use Brute Force Attack To Find Real Passwords From Handshake file Of WPA/WPA2 Encryption.


Things We Will Need In Order To Complete Our Exercise

  • Enable Wireless Card Monitor Mode
  • Analyse All Wireless Traffic Using Airodump-ng
  • Focus Airodump-ng Sniffer On Specific Access Point And Save All Capture Packets in A .cap file
  • Now, Send De-authentication Packets To Force Currently Connected Clients In Order To Exchange Their Pre-Shared Keys
  • Capture 4 Way Handshake Packets
  • Ensure you successfully Captured 4 Way Handshake Packets. 
  • Crack Password Using Aircrack-ng


So, Let's Start Our tutorial Step By Step

Setup 1.

Enable Your Wireless Card Monitor Mode.


:~# sudo airmon-ng start [Interface_name]





Setup 2.

Run Airodump-ng To Capture All Traffic

:~# sudo airodump-ng [Interface_name] 


Setup 3.

From Airodump-ng Terminal, Note Your Target Access Point MAC address And Channel Number


Setup 4.

 Now, Focus Your Airodump-ng Sniffer To Capture Only Specific Target Packet And Save in a .cap file. 

:~# sudo airodump-ng -c [ch] --bssid [AP_MAC_ADDRESS] -w [FILE_NAME] [Interface_name]



Setup 5.


Now, Generate De-authentication Packet And Send To Access Point. Basically, These De-authentication Packets Will Break The Connection Between Client and Access Point. Then, To Connect Back Again Client And Access Point Will Needed To Do 4 Way Handshake Procedure. 

Open A Separate Terminal And Type :

:~# sudo aireplay-ng --deauth 2 -a [AP_MAC_ADDRESS]


Setup 6.

Our Airodump-ng Has Capture 4 Way Handshake Packets.



Setup 7.

To Ensure 4 Way Handshake Availability We Will Use Aircrack-ng.

Open Separate Terminal And Type : 

:~# sudo aircrack-ng [wpa_file.cap]


Setup 8.


Now, We Will Again Use Aircrack-ng To Try All Passwords From Provided Dictionary To Crack Handshake File Encryption.

Type : 

:~# sudo aircrack-ng [wpa_file.cap] -w [dictonery_file_path]


To Create Password Dictionary Using Crunch In Kali Linux.. Check Here

Setup 9.

 Wait... wait.... and wait.  let aircrack-ng to try all passwords from provided dictionary to crack handshake file encryption.




Note: To Crack Wifi Password Successfully, Having Real password in Our Word List is Necceary.


Or


You Can Also Try Various Techniques To Crack Captured Handshake Packets Files.


Done!


Written By:
                  SSB

Crack WPA/WPA2-PSK Handshake File Using Aircrack-ng and Kali Linux

Namaste Hackers,



In This Post, I Am Going To Show You How To Crack WPA/WPA2-PSK Handshake file Using Aircrack-ng Suite.

Friends, I Am Assuming That You Have Already Captured 4 Way Handshake File To Try Our Brute Force Tutorial. If not, Then Check This Tutorial To Capture 4 Way Handshake File .

So, Let's Start Our Tutorial.

Setup  1.


To Ensure 4 Way Handshake Packets Availability In Captured File. We Will Use Aircrack-ng.

Open Separate Terminal And Type : 

:~# sudo aircrack-ng [wpa_file.cap]


Setup 2.


Now, We Will Again Use Aircrack-ng To Try All Passwords From Provided Dictionary To Crack Handshake File Encryption.

Type : 

:~# sudo aircrack-ng [wpa_file.cap] -w [dictonery_file_path]


To Create Password Dictionary Using Crunch In Kali Linux.. Check Here

Setup 3.

 Wait... wait.... and wait.  let aircrack-ng to try all passwords from provided dictionary to crack handshake file encryption.


Done!


Written By:

                 SSB

Capture WPA/WPA2-PSK 4 Way Handshake Using Kali Linux And Aircrack-ng

Namaste Hackers,



Today, I Am Going To Show You How To Capture 4 Way Handshake File Using Kali Linux And Aircrack-ng suite.

In Order to Crack Any WPA/WPA2 Wireless Encryption Without trying password directly against access point for hours of hours. We Can Use 4 Way Handshake Packets. 4 Way Handshake is a Process To Identify Clients Real Identities And Also To Exchange Their Pre-shared Keys , Responsible To Make Encrypted Connection Between Client And Access Point. So, Basically, We Will Try To Capture 4 Way Handshake Packets Of Target Access Point And Then We Can Directly Use Brute Force Attack To Find Real Passwords From Handshake file Of WPA/WPA2 Encryption.


Things We Will Need In Order To Complete Our Exercise

  • Enable Wireless Card Monitor Mode
  • Analyse All Wireless Traffic Using Airodump-ng
  • Focus Airodump-ng Sniffer On Specific Access Point And Save All Capture Packets in A .cap file
  • Now, Send De-authentication Packets To Force Currently Connected Clients In Order To Exchange Their Pre-Shared Keys
  • Capture 4 Way Handshake Packets
  • Ensure you successfully Captured 4 Way Handshake Packets. 


So, Let's Start Our tutorial Step By Step

Setup 1.

Enable Your Wireless Card Monitor Mode.


:~# sudo airmon-ng start [Interface_name]





Setup 2.

Run Airodump-ng To Capture All Traffic

:~# sudo airodump-ng [Interface_name] 


Setup 3.

From Airodump-ng Terminal, Note Your Target Access Point MAC address And Channel Number


Setup 4.

 Now, Focus Your Airodump-ng Sniffer To Capture Only Specific Target Packet And Save in a .cap file. 

:~# sudo airodump-ng -c [ch] --bssid [AP_MAC_ADDRESS] -w [FILE_NAME] [Interface_name]



Setup 5.


Now, Generate De-authentication Packet And Send To Access Point. Basically, These De-authentication Packets Will Break The Connection Between Client and Access Point. Then, To Connect Back Again Client And Access Point Will Needed To Do 4 Way Handshake Procedure. 

Open A Separate Terminal And Type :

:~# sudo aireplay-ng --deauth 2 -a [AP_MAC_ADDRESS]


Setup 6.

Our Airodump-ng Has Capture 4 Way Handshake Packets.



Setup 7.

To Ensure 4 Way Handshake Availability We Will Use Aircrack-ng.

Open Separate Terminal And Type : 

:~# sudo aircrack-ng [wpa_file.cap]


Now, You Can Try Various Techniques To Crack Captured Handshake Packets Files.


Done!


Written By:
                  SSB

how to install crunch word list generator in Ubuntu

Namaste Hackers


In This Post, I Am Going To Show You How To Install Crunch Wordlist Generator In Ubuntu?

Crunch Introduction


Currently, Crunch Is One Of The Best And Fastest Tool Available For Creating Custom Wordlist Files. Crunch can create a wordlist based on criteria you specify. The output from crunch can be sent to the screen, file, or to another program. The required parameters are:

min-len
               The minimum length string you want crunch to start at. This option is required even for parameters that won't use the value.

max-len
               The maximum length string you want crunch to end at. This option is required even for parameters that won't use the value.

charset string    
                          You may specify character sets for crunch to use on the command line or if you leave it blank crunch will use the default character sets. The order MUST BE lower case characters, upper case characters, numbers, and then symbols.
If you don't follow this order you will not get the results you want. You MUST specify either values for the character type or a plus sign. NOTE: If you want to include the space character in your character set you must escape it using the \ character or enclose your character set in quotes i.e. "abc ".

Now, To Install Crunch On Ubuntu First, You Need To Download Crunch Codes From Repo.

For Downloading Click Here

After Downloading Open Zip File,
And Extract it In Your Desktop

Now, Follow Below Commands.

Open Terminal And Change Directory To Current Downloaded crunch.c file


Setup 1.

 Make

:~# make

Setup 2.


Make Install


:~# make install

Setup 3.


Check Crunch Version


:~# crunch







For Crunch Usages Tutorial Click Here

Done!

Written By:
                SSB