"backtrack 5 r3"
Disclaimer: This video is for educational purposes only, and not intended to encourage the viewer to do cybercrime..as hacking any WiFi which you do not own, or without explicit permission from the owner is absolutely illegal. So as of this video I show you how to set-up a fake access point's to obtain a WPA handshake and serve the fake website, so whenever the client will input the correct password the Man In the Middle will also gather the data.
CODES USE IN THE VIDEO:
ctrl+c and select target
Open new terminal type this
"when open" input all of this
"Remember to save before add new terminal"
"You can now close this terminal" and back to the first terminal"
"gedit /etc/dhcp3/dhcpd.conf"
Start apache server by going -->application-->backtrack-->services-->HTTPD-->apache start-->start mysql application-->backtrack-->services-->mySQLD-->mysqlstart
"Don't close this", "Open a new terminal to create a new database in our MySQL server"
After this, you may now close this terminal back to your previous terminal--> "gedit WPAHacking.sh"
"when open input this"
"DONT FORGET TO SAVE before closing" then back to "gedit terminal"
"now we need to stop our interface, and put it back up on the right channel
"Press ctrl+c to stop"
//Don't forget to replace the words in the square brackets with the corresponding values...
"execute the bash-script we created before like this"
"After this" open new terminal to look for clients to de-authenticate on the network"
"Press ctrl+c to stop"
"Now after all done setting up you may sit back till someone fill into our trap relax and enjoy just wait for the client connect to our access point" when he fell into our trap we can get back to our MySQL database" and type codes below.
Then we should have our WPA/wpa2keys
0 Comments