SHARE

With technological advancements, changes have come about. It is now easier to hack a wifi password and use that wifi. Wifi has almost become a basic necessity in the daily lives of people given that it has gained popularity to the extent that most home owners have it installed in their houses. It is therefore imperative that we look at how wifi passwords are being hacked.

Wi-Fi Hacking
Wi-Fi Hacking
People have come up with ways that involve one not having to have a password in order to use another persons wifi. It is not as difficult as people perceive it to be. However it is a process that takes up quite some time. To hack a wifi password hackers have invented an evil twin AP. This is in a bid to discredit the real user. This means that the real user is de-authenticated. As they move in to re-authenticate and come across a site that looks legitimate, they may give the password . The hackers then capture it and use the evil twin as the AP and in so doing they are not suspected at all. This is called the wifiphisher, it has come across as sophisticated but there are other alternatives to this method.

There is another that requires some two wireless adapters and Kali linux. One must at least be capable of injection of package. The steps to a successful wifi hack are as below.

The first step is to download the site for wifiphiser. This is done from the site GitHub. After this then the code may be unpacked. This is the only to go about it however. One can alternatively clone the code and type it in. Then swiftly go over the directory and navigate that which one has created. In the directory or rather the listing of the contents the hacked will situate the listing from wifipisher.

Wi-Fi Hacking
Wi-Fi Hacking
Moving on swiftly is the process whereby one is required to run the code that they may have located from the script. This is simply done by typing the code and then running it. It is deemed that the most likely response to the request will be met by a hostile response and the term hostapd may appear. The hacker may then be requested to a prompt attempt at installation in a bid to authenticate the source and its legitimacy. To respond to this the hacker then types a y in the place of yes. That is to mean that it may be installed and the response just confirms it.
WiFi Hacking
WiFi Hacking
On completion the hacker then once more runs the script via Wifiphisher script. Once it has been executed, the wifi networks that are available or that are in the vicinity appear. At the bottom of all of them you will notice one that reads “wonder how to”. This is the site that is to be attacked therefore. Sending the attack will be the next move by hitting at control coupled with C. in so doing the target user is rendered de-authenticated. When the user wants to access the wifi then they will not notice any changes. This goes to show how unsafe wifi passwords are.

LEAVE A REPLY

Please enter your comment!
Please enter your name here