13th October 2009
I think that today's lab is the most attractive lab for me because Mr. Zaki is going to teach us how to hack a wireless password of a modem. We need wireless NIC (USB) and a software called backtrack or backtrack 2, 3 and 4.
First of all, Mr. Zaki ask us to find out a network called D-Linkvia wireless through our pc and connect it and the password give is '1a2b3c4d'. We using command prompt to login with the username is 'root' and the password is 'toor'. While for the backtrack, Mr. Zaki gave us a link and ask us to download from the website, the link given is www.remote-exploit.org/backtrack.html. Then we have to confirm whether the wireless card has been switch on and we start to check it out with command prompt. Type 'ipconfig' to know whether the network card can be used then type 'iwconfig' to know whether the wireless network card can be used.
According to Mr. Zaki, real key is set on wireless access point, 24 key is given by the IV and 40 key is given by ourselves. Next if want to switch on the rausb 0, then type 'ipconfig rausb0 up' in the command prompt to switch it on. Then a problem comes again, how to get to know whether it has been switch on? The answer is type 'ipconfig' again, then type 'iwconfig rausb0 mode monitor' following by 'iwconfig' nad we will see the 'Mode: Monitor'. After that, start the backtrack and plugin USB.
There are a lot of backtrack tool can get to hack computer. One of the way is type 'kismet' to scan the wireless. By doing that we can find all the information of D-Link. 's' is for sorting while 'b' is to sort according to BSSID. We need an encryption key here. Then we press 'q' to reach to Network List screen. Use airodump to cache the packet and save it in some path. Type 'airodump-ng --ivs -w output-abg rausb0' where the 'output' is the filename and rausb0 is the wireless network card.
After that, we need to type 'aireplay-ng -3 -b 00:1E:58:FB:57:ED -h 00:22:6B:A9:59:AF -x 1024 rausb0' where the first address is the MAC address, and the second address is local MAC address. While we do send a lot of packet to the network, it will send back some response too as feedback. We need to know how many IDs have cached. But don't worry, because Mr. Zaki mention that we can get the password even with a few of IDs have cached. Next, Type 'aircrack-ng -0 -n 64 -f 4 output-06.ivs' where 'output' is the file name, this command is to used to get the password.
Well, seems like we already reach our target today because we learnt the way to hack password and Mr. Zaki ask we not to use it on wrong way but what i feel the deepest is that I'm success learn what I want along this time.
