Jump to content
Nytro

[Video] Hacking WPA 2 Key - Evil Twin Method (No Bruteforce)

Recommended Posts

Hacking WPA 2 Key - Evil Twin Method (No Bruteforce)

Video made by TechnicDynamic, click and subscribe to his channel!

Canalul utilizatorului technicdynamic - YouTube

Description

In an ealier post, we've seen how to crack WPA-2 network keys using a dictionary.

While that technique works, it could take an awful long time, especially when brute forcing.

On this technique, named 'Evil Twin', we take a different perspective to the attack. Using a powerful long range wireless card (Alfa AWUS036NH), we clone the target network to confuse our victim. Then, we deauthenticate the victim from his own wireless network and wait until he connects to our access point - which looks exactly like his. :)

When the victim connects, he is redirected to a service page asking for the WPA-2 key in order to access the internet. As soon as we get the key, you can either allow the victim to use the network (maybe improvise some password sniffing?) or just bring it down manually.

For this example I created a service page, started apache and mysql to store the keys typed in a database.

Song: BGNS - Sasas

Original article:

Technic Dynamic | Hacking WPA 2 Key – Evil Twin (No Bruteforce)

Oblivion | Facebook

http://www.TechnicDynamic.com

* Video made under controlled circumstances for educational purposes.

Link to comment
Share on other sites

Pufff........puffffffffffffffffff,wau,e prima oara cind imi trece prin cap vazind articolul,o noua tehnica.Alfa poate lucra in mod client,sau AP........thanks,si la lucru sa vedem daca pacalim vreun vecin.

Se pare ca rezultatul la care ma gindeam eu este null.Ma gindeam sa clonez ,,un vecin" adica datele modemului sau,si sa snifez conexiunea ca sa prind momentul in care baga parola,numai ca am intilnit o mare problema,si anume faptul ca pentru asa ceva este nevoie intai sa-i ,,ascund" reteua proprie,ca sa nu o mai vada,si ca sa nu se mai conecteze automat calculatorul la acea retea.

Ma gindeam de fapt la un fel de phishing a retelei respective.

Din wifiway am posibilitatea sa-l dezautentific pe proprietar,dar asta nu ascunde reteaua lui,iar calculatorul se conecteaza automat.

Nytro sper sa nu te deranjeze ca am scris in topicul tau,a fost ceva de moment,si speram la o noua solutie care avea in vedere materialul tau.

Thanks!

Edited by wildchild
double post
Link to comment
Share on other sites

ideia nu ii noua ii de mult clonezi ap si flodezi dar binenteles ca trebuie sa fii noob sa cazii la vrajala desta mai bine merge cu fake ap identic cu original flodezi tot timplu si il deconecteza victima de la net tot timpul cint a incercat sa conecteze din nou si conecteza o data cu fake ap folosesti WirelessKeyView si ii ia keya wireless direct din Registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WZCSVC\Parameters\Interfaces\ si mai sint citeva scripturi care fura keya wireless

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...