- #RALINK RT2870 IN AP MODE SHOWING WARNING SYMBOL CRACKED#
- #RALINK RT2870 IN AP MODE SHOWING WARNING SYMBOL PASSWORD#
In other words, once we have the key on the wireless access point, not only can we use the bandwidth on the access point, but with airdecap-ng we can decrypt everyone's traffic on the AP and watch everything they're doing (the key is used for both access and for encryption).
#RALINK RT2870 IN AP MODE SHOWING WARNING SYMBOL CRACKED#
Step 6: Airdecap-NgĪirdecap-ng enables us to decrypt wireless traffic once we have cracked the key.
Let's take a brief look at each of these. Some of our more hack-specific tools include airdecap-ng, airtun-ng, airolib-ng and airbase-ng. We'll use each of these in nearly every Wi-Fi hack. These four tools in the aircrack-ng suite are our Wi-Fi hacking work horses. These include deauth, fake deauth, interactive, arpreplay (necessary for fast WEP cracking), chopchop (a form of statistical technique for WEP packet decrypting without cracking the password), fragment, caffe latte (attacking the client side), and others. If you've ever used Wireshark, you've most likely worked with pcap files. The pcap file is the standard file type associated with packet capture tools like libpcap and winpcap.
#RALINK RT2870 IN AP MODE SHOWING WARNING SYMBOL PASSWORD#
This can be especially useful in attacks like a deauth attack that bumps everyone off the access point, WEP and WPA2 password attacks, as well as ARP injection and replay attacks.Īireplay-ng can obtain packets from two sources:
Step 5: Aireplay-NgĪireplay-ng is another powerful tool in our aircrack-ng arsenal, and it can be used to generate or accelerate traffic on the AP. It's capable of using statistical techniques to crack WEP and dictionary cracks for WPA and WPA2 after capturing the WPA handshake. Step 4: Aircrack-NgĪircrack-ng is the primary application with the aircrack-ng suite, which is used for password cracking. As we can see in the screenshot above, airodump-ng displays all of the APs (access points) within range with their BSSID (MAC address), their power, the number of beacon frames, the number of data packets, the channel, the speed, the encryption method, the type of cipher used, the authentication method used, and finally, the ESSID.įor our purposes of hacking WiFi, the most important fields will be the BSSID and the channel.