Viewing 9 posts - 1 through 9 (of 9 total)
  • Author
    Posts
  • #141913
    rdangel
    Participant

    Hello,

    I have been trying everything I can think of to crack the password to my own router using everything I have learned in the Learning Ethical Hacking From Scratch course I took on Udemy, and this one Network Hacking Continued – Intermediate. I have thrown everything at my Router, I have used airodump-ng, aireplay-ng etc, following instructions and steps Zaid shows in the video lessons…. but I just can’t seem to grab anything. Every time I run airodump-ng my router’s network shows up several times in the list with different MAC addresses and Channels. When I use this info to try to grab the handshake on any of them, nothing happens because by the time I have input the parameters into airodump-ng, the channel and/or BSSID has changed. This must be a feature of my router that keeps it rolling around randomly, so that I can’t seem to pin it down long enough to run an attack on it. Can you help me figure out how I can get through this? Can you suggest an alternative method of cracking my WPA2 network? I am stumped.

    Btw… yes, my adapter IS in Monitor mode.

    Thank you
    Ross

    #142182
    Diego PérezDiego Pérez
    Moderator

    Hi!
    Can you tell me the exact model of your adapter?(brand and model)
    Can you share a screenshot with the commands used and the results please?

    Thanks!
    Diego

    #142238
    rdangel
    Participant

    Hi Diego, my Router unfortunately does not come with a lot of information… I believe it was built for my internet provider and so has their own logo and info on it: the brand is not given but I did some digging and I believe it’s Arcadya. The model listed is Telus WiFi Hub… but I think this is just the aftermarket model number they put on it. I’m attaching some screenshots of the process… tried many ways, but it always fails to capture the handshake, even though it says “Association Successful”. There is nothing written in the wap_handshake.cap file.

    PS. I have submitted this reply twice now, with screenshots attached, and gotten confirmation from your webpage… but when I return to it to view it I don’t see it on the post

    #142239
    rdangel
    Participant

    Sorry, I have reduced the screenshots each to less than 1 MB, but it just won’t attach them.

    #142240
    rdangel
    Participant
    #142539
    Diego PérezDiego Pérez
    Moderator

    Hi!
    I asked for the brand and model of the wireless adapter not the router.
    In the screenshots you are trying to run the fakeauth attack and as mentioned in the course it will only work against WEP encrypted networks. In this case follow the attacks mentioned for WPA/WPA2 networks. Also, in one of the screenshots it seems you are a bit far from the router, try to get closer.

    Greetings!
    Diego

    #143708
    rdangel
    Participant

    OK Diego, sorry I thought you wanted the Router info:
    – The adapter is a Realtek RTL8812AU which I purchased from you guys on the zSecurity Shop. As I said, it is running in Monitor Mode.
    – No I am NOT running a WEP attack. I am taking this Intermediate Network Hacking course because I have already completed the (prerequisite) beginner’s Learn Ethical Hacking From Scratch course on Udemy. The Intermediate course I am doing now picks up WPA/WPA2 Cracking in Section 5 and beginning of Section 6… and it assumes YOU ALREADY HAVE CAPTURED THE HANDSHAKE in the wpa_handshake.cap file…. Zaid does not show you how to do this because he assumes you have already learned how to do that in the Beginner’s course. The problem is… that I have followed Zaid’s lectures in the beginner’s course on WPA/WPA2 cracing, and Capturing the Handshake (Lessons 22, 27, 28 and 29)…. but I am just not able to capture the handshake and the WPS method doesn’t work on my Router. The wpa_handshake capture file never seems to have any data in it. I showed you the messages displayed in my Kali machine in the screenshots I sent you. this is the WPA/WPA2 (NOT WEP) attack I keep trying without success:
    – airodump-ng wlan0
    – on upper screen: airodump-ng –bssid <target MAC> –channel <channel #> –write wpa_handshake wlan0
    – on lower screen: aireplay-ng –deauth 4 -a <target MAC> -c <connected client MAC> wlan0
    and no handshake is ever captured. My network name WiFione and as you can see from the screenshots, the MAC keeps changing… sometimes I can’t find a connected client because the target MAC has now changed.
    And Diego… I cannot get ANY CLOSER to the Router…. I am literally 3 feet away from it, it’s sitting right in front of me.
    Please help, otherwise I am not going to be able to continue with the course… this is one subject I just can’t skip in order to move forward. Thank you,

    Ross

    #144106
    rdangel
    Participant

    Hello again,
    I just want to let you know that I tried the WPA/WPA2 cracking attack on the exact same network, with the exact same command strings… but on my Intel Mac and it worked!!! I originally had been working on my Mac M1 and that’s where I was having problems… but for some reason, when I switched machines to the Mac Intel I7 – even though I’m using the same versions of the zSecurity Custom Kali, now it seems to work fine and it has no problem capturing the handshake. Thanks for your suggestions so far… at this point, I’ve got this! Cheers,

    Ross

    #144533
    Diego PérezDiego Pérez
    Moderator

    Hi!
    Glad you got it!
    Diego

Viewing 9 posts - 1 through 9 (of 9 total)
  • You must be logged in to reply to this topic.