How To Hack Wifi Password : Steps Wifi Hacking – Cracking WPA2 Password
Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, WEP (Wired Equivalent Privacy)
A flaw in a feature added to Wi-Fi, called Wi-Fi Protected Setup (WPS), allows WPA and WPA2 security to be bypassed and effectively broken in many situations. Many access point they have a Wifi Protected Setup enabled by default (even after we hard reset the access point).
Requirements:
1. Wireless card (support promiscuous mode)
2. Access point with WPA2 and WPS enables
5 Steps Wifi Hacking – Cracking WPA2 Password:
1. Open our terminal (CTRL+ALT+T) and type airmon-ng (view tips and tricks how to create keyboard shortcut on kali linux)
this command will lists our wireless card that attached with our system.
2. The next step we need to stop our wireless monitor mode by running airmon-ng stop wlan0
3. Now we ready to capture the wireless traffic around us. By running airodump-ng wlan0 our wireless interface will start capturing the data.
From the picture above, we can see many available access point with all the information. In the green box is our victim access point which is my own access point 🙂
Information:
BSSID (Basic Service Set Identification): the MAC address of access point
PWR: Signal level reported by the card.
Beacons: Number of announcements packets sent by the AP
#Data: Number of captured data packets (if WEP, unique IV count), including data broadcast packets.
#/s: Number of data packets per second measure over the last 10 seconds.
CH: Channel number (taken from beacon packets).
MB: Maximum speed supported by the AP. If MB = 11, it's 802.11b, if MB = 22 it's 802.11b+ and higher rates are 802.11g.
ENC: Encryption algorithm in use.
CIPHER: The cipher detected. TKIP is typically used with WPA and CCMP is typically used with WPA2.
AUTH: The authentication protocol used.
ESSID: Shows the wireless network name. The so-called “SSID”, which can be empty if SSID hiding is activated.
4. From the step 3 above, we can find access point with encryption algorithm WPA2 and note the AP channel number. Now we will find out whether target AP has WPS enabled or not.
wash -i wlan0 -c 8 -C -s
if the WPS Locked status is No, then we ready to crack and move to step 5.
5. The last step is cracking the WPA2 password using reaver.
reaver -i <your_interface> -b <wi-fi victim MAC address> –fail-wait=360
Because we already get the information from step 3 above, so my command look like this:
reaver -i wlan0 -b E0:05:C5:5A:26:94 –fail-wait=360
it took about 5 hours to crack 19 characters WPA2 password (vishnuvalentino.com) from my Kali virtualBox, but it depend with our hardware and wireless card.
Conclusions:
1. WPA and WPA2 security implemented without using the Wi-Fi Protected Setup (WPS) feature are unaffected by the security vulnerability.
2. To prevent this attack, just turn off our WPS/QSS feature on our access point. See picture below (I only have the Chinese version 😛 )
More Hacking Technique
-
How successful marketing teams are optimizing performance in 2026 (and what
metrics they’re tracking)
-
[image: How successful marketing teams are optimizing performance in 2026
(and what metrics they’re tracking)]
HubSpot’s 2026 State of Marketing report u...
1 day ago
-
How I Set Up Guest Checkout in WooCommerce in Just 5 Minutes
-
I once tried to buy a pair of headphones I really wanted. But when I got to
the checkout page, the store asked me to sign in. Since it was just a
one-tim...
1 day ago
-
8 Top WordPress Plugins for 2026 (Build Faster, Keep It Simple)
-
8 WordPress plugins for 2026: builder, booking, data tables, animations,
maps, grids, and forms. Updated tools that speed setup and keep sites easy
to ma...
1 week ago
-
How I Get Paid to Shop Online (And You Can Too!)
-
We all shop online—whether it’s ordering dinner on Swiggy, buying the
latest sneakers on Myntra, or stocking up on groceries from Amazon. But
what if I t...
1 week ago
-
On a Happy New Year
-
We are about to experience the most social upheaval since industrialization.
What will that look like in sixty years?
Sinless is starting it's third yea...
3 weeks ago
-
9 Savvy Ways to Solo Travel Without a Plan | The Art of Winging It in Travel
-
[image: nagarkot, hiking nagarkot, nagarkot nepal]Last Updated on January
6, 2026 by Christine Kaaloa Anthony Bourdain famously said, “I’m a big
believer...
4 weeks ago
-
My Blogging Journey: From $0 to Global Influence (and Everything I Didn’t
Expect)
-
[…]
My Blogging Journey: From $0 to Global Influence (and Everything I Didn’t
Expect) is a post from ShoutMeLoud - Shouters Who Inspires
7 months ago
-
How to Remove FileOpen DRM Protection from PDF?
-
If you want to remove FileOpen DRM protection from a PDF, follow these
steps. Note that this method will only work on a system that already has
the neces...
1 year ago
-
Mastering Windows Commands: A Comprehensive Guide
-
*Welcome to our comprehensive guide on mastering Windows commands. In this
article, we'll delve into the world of Windows Command Prompt and
PowerShell,...
1 year ago
-
Best Travel Water Bottle: A Comparison Guide
-
Why We’re Water Bottle Experts Between Shawn and Angela, they’ve tested
dozens of water bottles while traveling. This includes more than a decade
of hard...
2 years ago
-
Apple Preparing to Launch USB-C Wired EarPods
-
Apple is reportedly gearing up to launch a new version of its wired EarPods
featuring a USB-C port. The news comes ahead of the release of the iPhone
15, w...
2 years ago
-
Assassin's Creed - 1.60 GB [Repack] - Full PC Game Free Download | By
Priyanshu
-
Assassin's Creed is an action-adventure video game developed by Ubisoft
Montreal and published by Ubisoft. It is the first installment in the
Assassin's...
5 years ago
-
How to Make Natural Hand Sanitizer using Home Products
-
Hand Sanitizers are basically essential in providing you with another level
germ protection, after washing your hands you can apply some hand sanitizer
w...
5 years ago
-
Most important Internet ERROR Codes
-
ERROR Code
Hello, guys, I'm going to show you most important internet ERROR codes that
actually help you future internet surfing experience. Today we ar...
6 years ago
-
How to Track Someone's Geographical Location using ExifTool
-
How to Track Geographical Location using ExifTool (OSINT)
Hello Readers
Nowadays , As you are aware that we all are attached to social media in
such a...
7 years ago
-
The Choice Engine
-
A project I’ve been working on a for a long time has just launched: The
Choice Engine is an interactive essay about the psychology, neuroscience
and philos...
7 years ago
-
Top 10 Best/Impossible Phone Patterns Ever
-
Probably you are searching for the android pattern lock ideas and you
landed here ! So, here we’ll discuss how you can create the most difficult
to unlock...
8 years ago
-
-
What is Ransomware and How to Stay Protected
-
Ransomware is a type cyber attack which uses malware to affect the files on
the computer by holding them hostage so that the user has to pay a sum of
amo...
8 years ago
-
How To Create Amazon AWS RDP 100% Free | Create Your Own VCC
-
How To Create Amazon AWS RDP 100% Free | Create Your Own VCC
Watch the full video to learn how to make it.. 100% working method.
8 years ago
-
5G Technology To Feature 20GBps Download Speed
-
Well, it was previously confirmed that 5G would be the official successor
to 4G wireless connectivity as the fifth generation mobile wireless
connectivi...
8 years ago
-
Get Free 100rs per Referal to ypur bank Account
-
Hello, Guys, Chillr App Loot where you can earn again now real money in
your bank account. Just Download the Chillr App and enter your mobile
number. No...
8 years ago
-
10 Mind Blowing Safety Tips To Avoid Being Scammed while E-Shopping
-
10 Mind Blowing Safety Tips To Avoid Being Scammed while E-Shopping
9 years ago
-
Hello world!
-
Welcome to WordPress. This is your first post. Edit or delete it, then
start writing!
The post Hello world! appeared first on Ethical Hacking Tricks.
9 years ago
-
100 SEO Tips To Increase your Blog Search Ranking on Google in Hindi
-
अगर आपके पास कोई वेबसाइट and blog है तो आपको पता होगा की site के लिए SEO
कितना जरुरी होता है और website search engine optimization कैसे किया जाता
है. सिर...
9 years ago
-
-
Watch Full Movie or TV Series in HD
-
*Watch Full Movie or TV Series in HD*
We all love movies and TV series but we have to depend on torrents or
any other free provid...
9 years ago
-
How To Stop Users Using Adblocker In Your Blog - Blogger
-
Google adsense is the main revenue for almost all free content published
blogs, but recently adblock kill us our main source of revenue. Though
Adblocker g...
9 years ago
-
AIr Panda Awesome Tap Game Available FREE for iOS
-
Are you ready to test your skills against the ultimate dexterity game? Take
control of a cute panda and help him gain the highest score all while
trying t...
9 years ago
-
AirTel Free Internet 3G Vpn Trick With Netify VPN | June 2016
-
Airtel Free Internet 3G Vpn Trick With Netify Vpn . ItWorks Only on
UnrootedMobilesNot for Rooted Mobiles Try at0 Balance With No Data Pack.
Steps To Foll...
9 years ago
-
Boost your Website Search Engine Rankings through your Android Smartphone
-
*Website Booster*
Give your website a boost by using this small utility. The app submits your
website URL to 2500+ back link sites in turn increasing the...
9 years ago
-
7 New Whatsapp features that will make you smarter
-
WhatsApp has recently completed 1-billion users. It has now become one of
the fastest mode of communication in many countries. It has got many new
featur...
9 years ago
-
How To Get Free Master Credit Card Online in 15 Min [For Online Use]
-
[image: Visa-Mastercard-credit-cards-e1387426494114]hello guys, Shivam
Here. like recent launch of Netflix which is free for first month but they
require a...
10 years ago
-
Wifi adapter packet injection test
-
[image: Thumbnail]Questions about if a certain Wifi adapter is compatible
with the Aircrack-ng suite or what Wifi card is capable of packet injection
and o...
10 years ago
-
10 Free Halloween Design Resources for Download
-
Halloween’s still a month away, but why not get a headstart on your themed
designs with these creepy cool free downloadable designs? Check out this
collect...
10 years ago
-
Easy Hide IP: Your Key To Anonymity On Web
-
No doubt, Internet is the greatest achievement of mankind in 21st century.
Cerebrum aka Brain is what makes all the difference between homo sapiens
and o...
10 years ago
-
How to make Modal Window & Popup Boxes with CSS3, Js and Jquery
-
[image: Creating Modal Dialog Popup Boxes with HTML, CSS3 and Javascript]
Modal boxes are quick operable boxes used for Advertisements, Login/Signup
Fo...
10 years ago
-
AIRTEL 3G NEW HOST TRICK FOR BLOCKED & UNBLOCKED - TRENDING UNLIMITED
-
We are here to provide you new configs for airtel 3G ;AirTel 3G New
Multiple Hosts For Blocked and Unblocked sim cards Trick Trending Unlimited
May...
11 years ago
-
How To Lock Your PC With Mouse | Learn Something Different!!!
-
We are here to learn about how to lock your PC with mouse. Just follow
these simple steps to do this-
1- Firstly Right click on your desktop and make new...
13 years ago
-
Add or remove your username in Start Menu
-
By default , windows shows your username at the top of start menu.If you
want to remove this , you can just follow these steps:
>>Go to Start>Run . Type *r...
14 years ago
-
AIRTEL: UNLIMITED FREE GPRS BROWSING FOR AIRTEL IN PC
-
Hi friends, hope you are all fine…After my last post on GET FREE TATA
DOCOMO 1p/2sec plan for 3months…I’m here with a FREE GPRS TRICK for AIRTEL….
Ø You...
14 years ago
-
Convert text into audio using Notepad
-
Notepad ; a simple programme. But we can do lot's of things with this. I
gave you more tricks from notepad here before. Today I am going to tell you
anot...
14 years ago
-
Hack passwords stored in your Windows.....
-
As we all know, Windows stores most of the passwords which are used on a
daily basis, including instant messenger passwords such as MSN, Yahoo, AOL,
Window...
14 years ago
-
Happy New Year 2011
-
*"WISHING A VERY HAPPY NEW YEAR 2011 TO ALL MY READERS"*
15 years ago
-
How to Hack into a Security Camera
-
This is really interesting article. Well this is not really hacking. All
what we are looking at are unsecured cams from around the world that are
interface...
15 years ago
-
Firefox Keylogger from TrUe HaCkinG to save passwords
-
Hello friends, After a long time, I am back with new hacking tool in this
blog and this blog now opened for all readers now .In this post I am going
to sho...
15 years ago
-
Fun with 2D Barcodes on Your Phone
-
Have you noticed those strange black and white grids - like demented
crosswords - popping up around the place? In newspapers, flyers and the
like? No? Well...
17 years ago
-
baby, wanna feel better?
-
*The foundation of all mental illness is the avoidance of legitimate
suffering* - Carl Gustav Jung
20 years ago
-
CLASSIC CYBER NOTCH
ReplyDeleteHow well are you prepared for a Cyber incident or Breach?, Is your Data safe?
Strengthen your Cybersecurity stance by contacting CLASSIC CYBER NOTCH @ GMAIL DOT COM for a Perfect, Unique, Classic and Professional Job in Securing your Network against all sort of breaches and from scammers as well.
For we are Specially equipped with the Best hands to getting your Cyber Hack needs met as your jobs will be handled with utmost professionalism.
We do All type of cyber Jobs such as:
✅ TRACKING of GPS location, cars, Computers, Phones (Apple, windows and Android), e.t.c.
We also Track
E-MAIL account,(G-mail, Yahoo mail, AOL, Proton mail, etc.)
SOCIAL MEDIA account, (Facebook, Twitter, Skype, Whatsapp, e.t.c.)
✅ RECOVERY of Passwords for E-mail address, Phones, Computers, Social media Accounts, Documents e.t.c,
✅ INSTALLATION of Spy ware so as to spy into someone else's computer, phone or E-mail address and also Installation of Spy ware software on your individual O.S to know if your Gadget is being hacked into..
We also Create and Install VIRUS into any desired computer gadget.
✅ CRACKING into Websites, CCTV Survelance camera, Data base etc, of both Private and Govt organization, such as Schools, Hospitals, Court houses, The FBI, NSA e.t.c
NOTE:
Other Jobs we do are:
✅ We provide Private Investigator service
✅ Clearing Criminal records of diverse type
✅ Binary Options fraud Recovery
✅ Bitcoin Mining
✅ Issuing of Blank ATM card
We assure you that your Job will be attended to with care and efficiency as it will be handled by the Best professional hands in Cyber literacy.
✅ We also have a forum where you can get yourself equipped with Advanced hacking Knowledge..
CLASSIC CYBER NOTCH gives you the Best service in the Hacking world.
Be sure to 📱 💻 us @
Classiccybernotch@gmail.com
any time, any day to get the Best Professional hands involved in putting a smile on your face.
We're Classic Notch
Signed,
Collins .A.