{"id":678,"date":"2019-12-14T07:08:16","date_gmt":"2019-12-14T07:08:16","guid":{"rendered":"http:\/\/zerothcode.com\/blog\/?p=678"},"modified":"2020-05-02T15:07:52","modified_gmt":"2020-05-02T14:07:52","slug":"wifi-hacking-tools","status":"publish","type":"post","link":"https:\/\/zerothcode.com\/blog\/wifi-hacking-tools\/","title":{"rendered":"Wifi Hacking Tools"},"content":{"rendered":"<p>Wifi Hacking Tools. Aircrack-ng runs on Windows and Linux, and can crack WEP and WPA-PSK. It can use the Pychkine-Tews-Weinmann and KoreK attacks, both are statistical methods that are more efficient than the traditional FMS attack. Aircrack-ng consists of components. Airmon-ng configures the\u00a0<em>wireless<\/em>\u00a0network card.<\/p>\n<p>&nbsp;<\/p>\n<p>Wifi Hacking Tools<\/p>\n<div class=\"featured-media\"><img loading=\"lazy\" decoding=\"async\" class=\"attachment-baskerville-2-post-image wp-post-image aligncenter\" title=\"Wifi Hacking Tools\" src=\"https:\/\/1unlimited8.files.wordpress.com\/2019\/01\/safe_image-6201732838..jpeg?w=1400&amp;h=9999\" alt=\"wifi-hacking-tools\" width=\"173\" height=\"171\" \/><\/div>\n<div class=\"post-content clear\">\n<h3>Wifi hacking tools<\/h3>\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"null\">$pkg install update\r\n$ pkg install upgrade\r\n$ pkg install git\r\n$ git clone\u00a0https:\/\/github.com\/esc0rtd3w\/wifi-hacker.git\r\n$ cd wifi-hacker\r\n$ ls\r\n$ chmod +x\u00a0wifi-hacker.sh\r\n$ sh\u00a0wifi-hacker.sh<\/pre>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-35 size-full\" src=\"https:\/\/1unlimited8.files.wordpress.com\/2019\/01\/safe_image-6201732838..jpeg?w=736\" sizes=\"auto, (max-width: 173px) 100vw, 173px\" srcset=\"https:\/\/1unlimited8.files.wordpress.com\/2019\/01\/safe_image-6201732838..jpeg 173w, https:\/\/1unlimited8.files.wordpress.com\/2019\/01\/safe_image-6201732838..jpeg?w=150 150w\" alt=\"wifi-hacking-tools\" width=\"173\" height=\"171\" data-attachment-id=\"35\" data-permalink=\"https:\/\/1unlimited8.wordpress.com\/safe_image-6201732838\/\" data-orig-file=\"https:\/\/1unlimited8.files.wordpress.com\/2019\/01\/safe_image-6201732838..jpeg\" data-orig-size=\"173,171\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"safe_image (6)201732838..jpeg\" data-image-description=\"\" data-medium-file=\"https:\/\/1unlimited8.files.wordpress.com\/2019\/01\/safe_image-6201732838..jpeg?w=173\" data-large-file=\"https:\/\/1unlimited8.files.wordpress.com\/2019\/01\/safe_image-6201732838..jpeg?w=173\" \/><\/p>\n<ul>\n<li>\n<h4>Wireless local-area networks are based on\u00a0IEEE 802.11. This is a set of standards defined by the\u00a0Institute of Electrical and Electronics Engineers.<sup id=\"cite_ref-2\" class=\"reference\">[2]<\/sup><\/h4>\n<\/li>\n<li>802.11 networks are either\u00a0<i>infrastructure<\/i>\u00a0networks or\u00a0<i>ad hoc<\/i>\u00a0networks. By default, people refer to infrastructure networks.<\/li>\n<li>Infrastructure networks are composed of one or more\u00a0<i>access points<\/i>\u00a0that coordinate the wireless traffic between the nodes and often connect the nodes to a wired network, acting as a\u00a0bridge\u00a0or a\u00a0router.\n<ul>\n<li>Each access point constitutes a network that is named a\u00a0<i>basic service set<\/i>\u00a0or BSS. A BSS is identified by a BSSID, usually the\u00a0MAC address\u00a0of the access point.<\/li>\n<li>Each access point is part of an\u00a0<i>extended service set<\/i>\u00a0or ESS, which is identified by an ESSID or SSID in short, usually a character string.<\/li>\n<li>A basic service set consists of one access point and several wireless\u00a0<i>clients<\/i>.<\/li>\n<li>An extended service set is a configuration with multiple access points and roaming capabilities for the clients.<\/li>\n<li>An independent basic service set or IBSS is the ad hoc configuration. This configuration allows wireless clients to connect to each other directly, without an access point as a central manager.<sup id=\"cite_ref-3\" class=\"reference\">[3]<\/sup><\/li>\n<li>Access points broadcast a signal regularly to make the network known to clients. They relay traffic from one wireless client to another<\/li>\n<\/ul>\n<\/li>\n<li>Ad hoc networks have no access point for central coordination. Each node connects in a peer-to-peer way. This configuration is an\u00a0<i>independent basic service set<\/i>\u00a0or IBSS. Ad hoc networks also have an SSID.<sup id=\"cite_ref-autogenerated5_4-1\" class=\"reference\">[4]<\/sup><\/li>\n<\/ul>\n<p><a href=\"http:\/\/zerothcode.com\/blog\/facebook-hack-off-activity\/\">Read More: facebook-hack-off-activity<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Wifi Hacking Tools. Aircrack-ng runs on Windows and Linux, and can crack WEP and WPA-PSK. It can use the Pychkine-Tews-Weinmann<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[529],"tags":[],"yst_prominent_words":[238,1089,1098,1097,1090,1103,1093,1092,1096,645,1100,1101,1094,1099,584,1091,1095,1102,644,643],"class_list":["post-678","post","type-post","status-publish","format-standard","hentry","category-termux"],"_links":{"self":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/678","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/comments?post=678"}],"version-history":[{"count":0,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/678\/revisions"}],"wp:attachment":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media?parent=678"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/categories?post=678"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/tags?post=678"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/yst_prominent_words?post=678"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}