How to Hack Wifi Password 2022

 i'm  gonna show you how can you actually hack  into wi-fi network and gain its password  so before we get started a quick  disclaimer that please make sure that  you learn something from this and the  tools that we are going to use today  please don't try to hack and test on  others network and get in some kind of  illegal activities so with that being



  said let's get started  so this article  will be split up to four  steps step number one will be putting  your wi-fi card to monitor mode the step  number two will be actually capturing  the available wi-fi networks around you  the third step is to actually capture  the wpa handshake from our victim and  the fourth step will be actually  cracking the wpa handshake and getting  the passwords ultimately  let us get to our first step which is  actually installing our tools  but i haven't included that in our steps  because it's actually already installed  on kali linux if you  are using that but for me i'm using lens  mint so i have to actually install that  track  password  and  it's already installed i didn't know  that  so now let us start with step number one  which is actually put your wi-fi card to  monitor mode for that first type in  ifconfig  and it should return something like this  and you should get the name of the  wireless wi-fi card of the device for me  it's wl p1 s0  and let me just clear that  and type in  airman in g  star wl 31 s0  oops guys forgot to  give it root for villages so  and you can see  something like this  you can see the information about your  driver the chipset that you're using  etc etc and now you can see the wi-fi is  disconnected for device that means  you have put your wi-fi card to monitor  mode so now if this works now we have  actually successfully  managed to put our  wireless  card to monitor mode now you have to  actually check if this thing  captures  anything so for that type in sudo  sudo a road dumping  dumping and you can see your  wireless card's name has been changed to  w  l p 1 s 0 mod that means you have to  type in w l p 1 s 0 mod which stands for  my interval type enter and it should  show something like this  and you can see something is actually  popping up on my screen  you should also probably get something  like this so now we have successfully  completed two steps which was first step  number one which is actually for your  wi-fi card to monitor mode and the  second step was to actually capture the  wireless networks around you  so now we are moving on to the step  number three which is actually capture a  wp handshake from our victim our victim  over here is this one which is  let me just go



ahead and copy that  now we are at step number three to  actually capture the wp handshake of our  victim  so for that we are going to open up a  new terminal and type in sudo  something dumping  or something  and you have to pass the bssid which you  have targeting on so which will be this  one that i copied earlier so paste that  now you have to actually pass the  channel number which we are listening on  it will be channel 9  and now we have to actually  write the capture data to a file which  will be wpa  and type in the monitor name of  the card  p10  more that enter  and it will show  like this  so basically what it does is that it  will actually wait for a client to  actually disconnect from the ap and  actually reconnect from the access point  so resulting we will be capturing a wpa  handshake from the victim so now let us  go ahead and stop this and wait for the  victim to actually disconnect and  reconnect and hopefully we'll get  a capture handshake  a few moments later  there we are we got the handshake that  would be handshake on the base id and it  has been saved to the wpa  file  so now after capturing the wpa handshake  if you look inside the directory you can  see something like this wpa one dot cab  file and different kinds of file enable  that  so we are interested in wpa1 dot cap  file  now we are going to actually decrypt the  password for that type in sudo  aircrack  ng oops here correct ng  and pass the file name which would be  wpa  uh one  cap file  then  pass the word list which we are using to  actually decrypt the password  w  and the word list file  press type render and you can see we got  the key which is one two three four five  six seven eight  we have found the key of the access  point this is fast because we only have  about 25 keys to be tested and it only  had tested seven keys to find the  password  so if you're on kali linux there will be  a file name rocket or txt inside slash  word list you can use that if you  have a big password to crack on  so  it will take some time to actually crack  the password but hopefully we got the  password  so now we have to actually stop the  monitor mode and revert it back to  normal mode right  so for that type in sudo

 


airman  ng  stop and the card name which will be w1  p1 s0 more and type enter  and it will be reverted back to normal  mode and let me just go ahead and test  if the password was correct  so you can see wi-fi is showing up  victims wi-fi if i type in one two three  four five six seven eight and if i  connect  you can see we have connected to the  victim's wifi over here  so guys thank you for watching make sure  that you Like Thank You

Comments