How To Crack WPA2 WiFi Password With AirCrack-NG - WiFi Pentesting Video 2024

Поділитися
Вставка
  • Опубліковано 27 лис 2024

КОМЕНТАРІ • 352

  • @tznutz4824
    @tznutz4824 11 місяців тому +451

    You can use aircrack, wifite, reaver, etc.. but all these method will only work if the wordlist being used has to have the actual password within in or else its useless. So for those reading don’t assume that your breaking into everyone’s wifi using this method as it did his, the password to his network he already added into a wordlist that he used to basically cross reference using aircrack nothing special.

    • @itszme8912
      @itszme8912 10 місяців тому +13

      So what works better ? For hacking an Wifi

    • @lesterdelacruz309
      @lesterdelacruz309 9 місяців тому +6

      Thank you Sir. So what are the other methods?

    • @VikramSinghRajput0001
      @VikramSinghRajput0001 9 місяців тому +7

      Is there any other method to get without word list?

    • @balluramrathore5382
      @balluramrathore5382 9 місяців тому +8

      so plz tell me is there any other powerfull method to get the password...without the wordlist method

    • @comoyun
      @comoyun 5 місяців тому +1

      @@VikramSinghRajput0001 One way is to create an access point that has the same name as the original one. You will need 2 Wi-Fi adapters. One for jamming clients and one for the malicious access point a.k.a Evil Twin. Jammer should emit stronger signals or be close in range to disrupt communication and possibly kick devices out of the network. AP will not have any password but a web-server set up.
      When your Wi-Fi connection drops frequently (because of the jammer), you'll open up your Wi-Fi settings to see what's happening, and at that moment you will discover the Evil Twin AP, which you will probably connect with "there's a glitch" on mind. And when you do so, your phone automatically opens a website which will greet you with a fake warning message eg. "firmware update", "2step auth". And there will be an input field where you enter the password of the AP.

      Because you already captured the handshake during deauth, you are be able to hash whatever user entered and compare if they match with the captured one. This allows you to tell users what they entered is fake and build one layer of trust. This is a bit involved process, but tools like EvilTwin and Airgeddon will make it a piece of cake. You can look them up on GitHub.

  • @bakuninulianov720
    @bakuninulianov720 11 місяців тому +50

    If you capture a Handshake or a PMKID with Airgeddon, you choose the WPA/WPA2 Offline Decryption Menu option and then you choose the option: Aircrack + Crunch Brute force attack on the Handshake/PMKID capture file, it tells me to write the length of the key, how do you know the length of the key?
    How do you know if it has only uppercase letters, if it has only lowercase letters, if it has only numbers, if it has only symbols or if the key has characters of all types?

    • @MigoaHamed
      @MigoaHamed 3 місяці тому +4

      This method is only efficient if you have a previously collected data with you, like the 4 way handshake capture and a ton of info on the password. It's not for entirely finding a password, and it doesn't work like the movies, sometimes you gotta get out there and collect necessary info before doing something, or the wireless owner should be dumb enough to use passwords that are in public wordlists for years.

  • @MikeSanders55
    @MikeSanders55 Рік тому +23

    i dont know if these password lists will ever find anything.. i mean even if i use Rockyou that has 14 million passwords.. it's still not gonna have my password. I only have my wife's name and some numbers and characters and still didn't find it.. i mean not all lists will have it all..

  • @linux-fu24
    @linux-fu24 10 місяців тому +39

    The final part is the most haunting because the cracking process is not as easy as it might look so your best bet is to create your own password list using crunch if you already know a thing or two about the target or you can crack the password online with servers equipped with very fast GPUs but this last choice will cost you money. Personally I prefer to use CRUNCH combined with a good computer that has a powerful GPU and a lot of ram

    • @cracc_baby
      @cracc_baby 4 місяці тому

      yes its easy to deauth a device and capture a handshake.. i crack with a different machine running windows.
      you might get a better understanding if you learn the method shown in the video before moving on to using more advanced tools without comprehending how it works

  • @kevindodimead9066
    @kevindodimead9066 10 місяців тому +31

    I remember doing this in 2010 with WEP passcodes and Linux BackTrack

    • @jeremym-i6x
      @jeremym-i6x 10 місяців тому +5

      Same bro ! I cant believe its still the same process in 2024 , why cant you just capture the handshake and decrypt it instead of a wordlist

    • @Mephonly
      @Mephonly 6 місяців тому

      ​@@jeremym-i6xthe thing is wpa2 is too secute to decrypt

    • @emiyakiritsugu6329
      @emiyakiritsugu6329 4 місяці тому

      ​​@@jeremym-i6x what? decrypt it instead of matching it through the wordlists? I don't get you but it seems like it'll be a better way to hack the password which I'll never find in wordlists...

    • @yes3293
      @yes3293 4 місяці тому

      Wait, does that mean it's actually possible to crack my neighbor's WiFi?

    • @saidibrahim5931
      @saidibrahim5931 3 місяці тому

      ​@@jeremym-i6xhow do you do that ?

  • @Tyler-nj3wp
    @Tyler-nj3wp Рік тому +14

    3:30 lol

  • @antoniosebastian6590
    @antoniosebastian6590 Рік тому +13

    Been doing this kind of work since 97. I like your style my man. Cheers

    • @InfoSecPat
      @InfoSecPat  Рік тому +4

      Awesome! Thank you! I appreciate that 😎

    • @antoniosebastian6590
      @antoniosebastian6590 Рік тому +2

      @@InfoSecPat of course! Lot of changes happening soon with the pentesting industry... Looking forward to seeing more.

  • @technicalgamer44
    @technicalgamer44 Рік тому +22

    hello. after running command "airodump-ng wlan0" my wifi adapter doesn't showing me clients. do you know what to do.please help me my wifi adapter is in monitor mode.

  • @khoatrananhcse2004
    @khoatrananhcse2004 Рік тому +7

    2:53 why my terminal shows no BBSID scanned. There’s just a blank space. Help me.

  • @jeffersonmbawike7275
    @jeffersonmbawike7275 Рік тому +10

    My bsssid. Doesn’t have any stations after I ran a airodump-c capture even though I have my phone and other devices connected to the network… pls any idea on what to do

    • @ahmedbaksh3778
      @ahmedbaksh3778 4 місяці тому

      Ever figured it out brother?

    • @cracc_baby
      @cracc_baby 4 місяці тому

      not airodump -c, airodump -d (or --bssid) is the switch for bssid mac

  • @prodKossi
    @prodKossi Рік тому +8

    The deauth doesnt appear to be limiting my victim device in any way, and im not able to capture the handshake at all, even if i manually reconnect my victim device.
    The MAC adresses for both the AP and the victim device are correct, but the victim device still has internet, and no handshake is ever captured..
    I already "hacked" it by using Fern, but with a custom wordlist that included the wifi pwd on purpose, just to test that it worked - so in theory it should work using AirCrack too..
    Any advice? :)
    Oh, and any tips for how i could bruteforce instead of using a wordlist too? :D 💜

    • @MigoaHamed
      @MigoaHamed 3 місяці тому +1

      You must be really in a close range if you're using your internal wifi adapter, to be able to do a deauth

  • @Sjtklmh08081
    @Sjtklmh08081 11 місяців тому +4

    In the last click. They given me that message (Failed to open Capture-Par-01.cap (2):No such file or directory

  • @Gr8Poseidon
    @Gr8Poseidon 11 місяців тому +2

    3:33 WAP!!🤣🤣🤣🤣🤣

  • @MicTheXception
    @MicTheXception Рік тому +37

    second time going over this video in conjunction with many other leading ethical hacking/ kali linux videos and i appreciate your thoroughness in explanation and the way you show it as well. keep it up .

  • @shame4049
    @shame4049 Рік тому +69

    Why when i do check kill i lose wifi

    • @taqi3703
      @taqi3703 Рік тому +9

      when your wifi card goes into monitor mode, you lose the wifi connection but you can still continue with whatever capture / attack you're trying to do.
      You can turn off monitor mode after and it will start working again

    • @ashutoshgaikwad750
      @ashutoshgaikwad750 Рік тому +2

      Skip it it's not mandatory

    • @Trxckzey
      @Trxckzey Рік тому +2

      Because it’s putting your WiFi card in monitor mode

    • @adaghraphs
      @adaghraphs Рік тому +2

      you probably try to crack ur own wifi

    • @da-mealish
      @da-mealish Рік тому

      I was wondering the same thing

  • @carfo
    @carfo Рік тому +16

    Would be helpful if you explained what the switches are

  • @aaroncardoso5149
    @aaroncardoso5149 11 місяців тому +6

    any know why the Password.txt it doesn't appear to me?

    • @quanghao9564
      @quanghao9564 10 місяців тому

      me too. Can u fixed it

    • @sniperbrother7657
      @sniperbrother7657 3 місяці тому

      I have to first unzip it in your kali Linux app

  • @hulkgqnissanpatrol6121
    @hulkgqnissanpatrol6121 Рік тому +2

    Just let my neighbour know his password after I shutdown his network to prove my point.
    I used a 500,000 word dictionary based on animals, characters, popular names ect. I found the password @ 48% and 2:36 seconds.
    Strange that my pci Ac1300 refuses to go into monitor mode but mu $5 Asus UsbN13 has no problem's? 🤔
    Could it be a driver error?

  • @XxxSpud
    @XxxSpud 6 місяців тому +12

    Im at that point of life again where i think i can become a hacker

    • @nylnoble1836
      @nylnoble1836 4 місяці тому

      The method of that video really works to you?

  • @ShubhamGupta-xp5ik
    @ShubhamGupta-xp5ik Рік тому +7

    Bro i did all the steps carefully but doesn't found any eapol file and because of it i can't run dictionary attack on it

  • @OsamaWork-w4o
    @OsamaWork-w4o 8 місяців тому +1

    I did not understand how to activate the new tab because I opened a new tab, turned on the root, and followed the steps, but it did not work

  • @Unexality
    @Unexality Рік тому +5

    When I type iwconfig, I do not get the wlan0 option, do I need to install a driver for it?

    • @mrfunkin202
      @mrfunkin202 4 місяці тому +2

      sudo apt-get install iwconfig

  • @kevinm.8808
    @kevinm.8808 Рік тому +5

    Additional note: If you want to get only the pcap file and not every other crap add - -output-format pcap

  • @kheladhulaobiram
    @kheladhulaobiram Рік тому +4

    In the de authentication process, how do I know what's my access point?

  • @christian2389
    @christian2389 Рік тому +3

    When I use "airodump-ng wlan0" no connection appears even if time elapses, what can I do?

    • @faye35039
      @faye35039 4 місяці тому

      It's because you don't have a wifi adapters

    • @Josh-jpg
      @Josh-jpg 4 місяці тому

      Use wlan0mon

  • @NDW76
    @NDW76 Рік тому +10

    Forgive me if this is a stupid question. I understand that if you are running Linux as a virtual machine you need a usb wifi adapter. But if you are running a live installation and have access to the computer's onboard wifi adapter, do you still need a usb wifi adapter?

    • @Mayo2399
      @Mayo2399 Рік тому +3

      Is a must

    • @ayoxen4031
      @ayoxen4031 Рік тому +3

      My built in NIC can be put into monitor mode too. I guess the difference is the range.

    • @roolee2k
      @roolee2k Рік тому +5

      hell, even if you use Usb wifi adapter, you need to find the right USB wifi adapter, not just any adapter.

  • @ankushsharma1843
    @ankushsharma1843 Рік тому +2

    Please make a video on channel changing issue in airodump-ng because no video on UA-cam regarding this issue

  • @abudenshukry3475
    @abudenshukry3475 2 місяці тому +1

    thanks bro .. I got my neighbor password free now

    • @InfoSecPat
      @InfoSecPat  2 місяці тому +1

      Don’t do anything you don’t have permission to do. Hope he gave you permission 😊

  • @moviesync3131
    @moviesync3131 Рік тому +1

    Not so fast. When I tried going to monitor mode, something came up saying 2 filths are doing some crap and I have to kill the interfering processes.
    When I did that one alone were killed which was my NetworkManager which it disabled.
    What do I do because I don't know

    • @InfoSecPat
      @InfoSecPat  Рік тому +1

      Yeah, remember this is just for demonstration purposes. The network manager if it gets disabled, you have to restart the interface. Or just reboot your virtual machine

  • @al73r
    @al73r 10 місяців тому +2

    I wanna see this done with no dictionary and only rainbow tables

  • @MapleJokerRofl
    @MapleJokerRofl Рік тому +10

    I have a router that creates a guess wireless network.. where they connect and it brings them to a web page and they have to enter the password. How can I approach getting access into this router via that route

  • @jitendra3834
    @jitendra3834 Рік тому +3

    While using wireshark i am facing problem failed to create compose table

    • @jitendra3834
      @jitendra3834 Рік тому

      Please provide me solution i am not able to save file on /home/kali

    • @Арзбек
      @Арзбек Рік тому

      did you find answer , i also have problem like your

  • @wahyuditsai9890
    @wahyuditsai9890 Рік тому +2

    Hi, i'm totally new. Can you help when I type this:
    airodump-ng -C7 -w Capture-Pat -d 24:D3:F2:F9:1A:28 wlan0mon
    Checking available frequencies, this could take few seconds.
    Done.
    No valid frequency given.
    How to solve this ? thank you

  • @matthewlathum9312
    @matthewlathum9312 5 місяців тому

    Dear Pat, thank you for such a useful tutorial. Unfortunately, I am even less than a beginner and the operation is broken up because of the network disconnecting me during the process. I am using Kali Linux 24.2. I'm following step by step exactly as you are showing us! Thank you! My aim is to be second Kevin Mitnick

  • @lior_bruchim
    @lior_bruchim Рік тому +3

    wonderful explanation job🙏

    • @InfoSecPat
      @InfoSecPat  Рік тому +1

      Glad you liked it. Thank you

  • @FerhatGüngör-n5h
    @FerhatGüngör-n5h 11 місяців тому +2

    Wlan0 text does not appear on me. I have a Linux installed on virtualbox. 1:50

  • @ARR1414
    @ARR1414 Рік тому +9

    Hello , question… what if you know a part of the password and the wordlists do not contain the password , can you use -t %%%%%% instead of -w for wordlists or how would you do that

    • @huistelefoon5375
      @huistelefoon5375 Рік тому +1

      you'd have to generate your own wordlist based on your knowledge of the password

    • @anybroke
      @anybroke Рік тому +2

      Use hashcat and mask attack. Like passw?a?a?a

  • @blossroom
    @blossroom 6 місяців тому +1

    Saçmalıktan ibaret world list te her sifre olmayabilir! Olsa bile milyonlarca kombinasyon ndemektir

  • @asipalacios8701
    @asipalacios8701 8 місяців тому +1

    2:54
    followed along and it doesnt show anything after airodump-ng wlan0. my nic is in monitor mode

  • @Whitemike63
    @Whitemike63 Рік тому +2

    I always use WPA 2 and WPA3 on another router with a 25 character password very mixed and
    I keep WPS disabled. I just got a new router which allows me to install and use wireguard as my
    VPN server for 40 bucks. Im using mullvad with my linux setup. However 1 flaw in my new router
    is it shows WPS is enabled and there is no option to disable it. With the password Im using is
    my router/VPN server still OK ? I used kali with a program Wifite to try and crack the WPS setup
    I have and it didn't work. I haven't tried every tool but wonder if I should make my password longer
    or not bother ??
    I only had success with a WPS exploit when the password was pretty weak. Could they still get my
    wps pin ? Maybe Im being extra paranoid but just wondering.

    • @InfoSecPat
      @InfoSecPat  Рік тому +2

      That’s a really good question. The best way to do is try to crack it. But if you ran Wifite I didn’t crack it. I think you should be in good shape. There’s probably other tools out there, but I wouldn’t get too crazy about it.

  • @ils-4449
    @ils-4449 11 місяців тому +13

    Its a really worthy 10minutes Thanks for ur efforts ❤

  • @oppie2019
    @oppie2019 Рік тому +1

    When ever i try to send death packets i keep getting bssid not found

  • @eidodoos
    @eidodoos 10 місяців тому

    if you think you can crack wpa2psk, forget it. it possible but not happening in real world

  • @slacrf6544
    @slacrf6544 9 місяців тому +1

    its too slow to get handshake packet, maybe wait for couples of days

  • @모모-e8b
    @모모-e8b 3 місяці тому

    No matter how much I try, only some (2nd and 4th) EAPOL packets are captured. Does anyone know a solution? Fixing the channel, manually reconnecting the device to the AP, or sending a deauth packet doesn't work. Despite extensive searching, I haven't been able to find a solution. Please please help me😭😭

  • @Isabellawithaz
    @Isabellawithaz 9 місяців тому +2

    Its more like bruteforce the password bro

  • @the_deducter
    @the_deducter Рік тому +4

    From where you got password.txt please explain

  • @ivanleko6998
    @ivanleko6998 3 місяці тому

    why i dont have EAPOL files in wireshark ? and when i trakc my iphone under "Notes" it doesnt say "EAPOL" , nothing stands there...

  • @mohamed_s_o_f
    @mohamed_s_o_f Рік тому

    When I reach the stage of Ibol, nothing appears

  • @wahyuditsai9890
    @wahyuditsai9890 Рік тому +3

    How is the password.txt created ? Appreciate your answer

    • @InfoSecPat
      @InfoSecPat  Рік тому +3

      I created a password list. You can make your own or use something like rockyou in kali.

    • @pinkdolphin8017
      @pinkdolphin8017 Рік тому

      @@InfoSecPatis this useful at all for cracking into networks that don’t contain this password.txt?

  • @ocis
    @ocis Рік тому +2

    an alternative to this would be wifite2

  • @Mostafa_Hafez_
    @Mostafa_Hafez_ Рік тому +4

    I tryed and get errer for get password?

  • @hemanthperumandla001
    @hemanthperumandla001 Місяць тому +1

    I didn't get the password txt file

  • @DJABOU-SUCCESS-MOTIVATION-TV
    @DJABOU-SUCCESS-MOTIVATION-TV 3 місяці тому

    you show us a revealed password but don't indicate how you actually did it and also what dictionary you used, upload it or tell us where it is?

  • @sandeepkumar35
    @sandeepkumar35 17 днів тому

    I don't understand due to lack of technical skill but I just want to know if it is easy to hack complex password? Someone in my dormitory hacked my password and spread it to all the students in the building. And since my room was next to kitchen everyone was enjoying my wifi while cooking or eating there

  • @AnesSeddiki
    @AnesSeddiki Рік тому +13

    thank u so much it's very helpful and i like your honesty you're legit , i have just one question : is the password.txt file automatically generated or it's a word list that you have created ?

    • @ReospecMedia
      @ReospecMedia Рік тому +4

      he created his password his own.

  • @Ziyodjonmirzo
    @Ziyodjonmirzo 8 місяців тому +1

    I can't password.txt, help please

  • @Globalsales2035
    @Globalsales2035 10 місяців тому

    what if the password isn't in your list? you'll never get it?

  • @tadzzio9211
    @tadzzio9211 6 місяців тому

    aircrack-ng wlan0
    Reading packets, please wait...
    Opening wlan0
    Failed to open 'wlan0' (2): No such file or directory
    Read 0 packets.
    No networks found, exiting.
    Quitting aircrack-ng...

  • @idabagusketutadityawarma193
    @idabagusketutadityawarma193 2 місяці тому +2

    There is no password.txt in my ls bro

    • @InfoSecPat
      @InfoSecPat  2 місяці тому +1

      Yeah because that is wordlist i made. You will not have that.

    • @JonathanMorris-f2o
      @JonathanMorris-f2o Місяць тому

      and which type of file i need chose ? .cap?

  • @mridulsingh1399
    @mridulsingh1399 8 місяців тому

    It takes too much time but failing even I created a different file with contain the right password and select that file during the process still failing

  • @superfutbolistas
    @superfutbolistas Рік тому +2

    awesome video thank you sir

  • @Aru8675
    @Aru8675 Рік тому +1

    From where did you download that password.txt can you provide any latest or fresh password text file which contains bunch and huge combinations of passwords of 2023

    • @InfoSecPat
      @InfoSecPat  Рік тому +2

      It’s a password list that I just created and I threw some in from the rock you as well. There’s many password list out on the Internet, or you can just create your own.

    • @Арзбек
      @Арзбек Рік тому

      bro i have error with -w (~/...) i have error option-w failed whyyyy

  • @cracc_baby
    @cracc_baby 4 місяці тому

    i like to use KONSOLE and split the view, makes it easy to airodump in one terminal while you aireplay in a second terminal, all in same window.. u cant sudo apt install it though, has to be built from script
    also bro, not to bust your chops, but your cap file is gonna be polluted with deauth packets, you dont even need to start airodump writing the output until AFTER you deauth the device.. if you watch the number of lost frames you can see exactly when the device's connection gets reset, and then start airodump -w

  • @sxzz3480
    @sxzz3480 11 місяців тому +3

    Hey idk if you will see this, but let's say i wanna use a router as my network adapter, how do i set it as my main network adapter? Should i just connect it to my laptop through ethernwt wire and type airmond-mg eth? ( i am newbie)

  • @0weirdfox0
    @0weirdfox0 11 місяців тому +2

    Do we need to have to be connected to internet to perform this attack. Pls someone answer me please

    • @InfoSecPat
      @InfoSecPat  11 місяців тому +1

      No, you don’t have to be connected to the Internet

  • @diesel4h295
    @diesel4h295 10 місяців тому +3

    bruteforce?
    lucky for some hackers.
    easy for some content creators 😅

    • @InfoSecPat
      @InfoSecPat  10 місяців тому +5

      At the end of the day, it’s just showcase and how the technique is done. Obviously, if you get a hash, you can take it off-line and utilize better word lists if you have more time.

  • @feirsamlast_name2932
    @feirsamlast_name2932 5 місяців тому

    4:35 does the file need to exist or is ti automatically created? what file format is it?

  • @algoritmoalgoritmo4305
    @algoritmoalgoritmo4305 Рік тому +2

    The reality is quite different...

  • @ZeropowerXD
    @ZeropowerXD Рік тому +1

    yo cuando intento el handshake me termina saliendo "interface wlan0 down"

  • @ChetPanha369
    @ChetPanha369 Рік тому +1

    I don’t see my password.txt 😢

    • @Paul-ug4td
      @Paul-ug4td Рік тому

      Me too

    • @andresfrrrrrr
      @andresfrrrrrr Рік тому

      thats the word list, is a database of possible passwords, actually this method to crack a wifi password is not good, it is limited in the words that you have on that list, if the password is not there, you'll not crack it. So, is not very useful in most cases

    • @korrekturensohn_
      @korrekturensohn_ Рік тому

      🤦🏻‍♂️🤦🏻‍♂️🤦🏻‍♂️

  • @islamcheraitia4166
    @islamcheraitia4166 10 місяців тому

    KEY NOT FOUND
    for me i try it in my wifi and thats what i have i think thats beause the password in CAPITALletter

  • @liudvikasproductions
    @liudvikasproductions Рік тому +1

    hey after the airodump ng wlan0 command it doesnt show any networks but it switches between channels and all that

  • @leoplaza355
    @leoplaza355 3 місяці тому

    what’s the “password.txt” contains? That’s what’s important around there!

  • @gamer-di8mq
    @gamer-di8mq Місяць тому

    i tried this on an semi-installed ubuntu distro (wsl) wlan0 didin't appear but on my kali bootable it shows any fixes to make it work on my ubuntu?

  • @Fidk2706
    @Fidk2706 10 місяців тому

    Why does "airodump-ng --help" immediately appear when I press airodump-ng -c? Please explain

  • @sardorsattorov9914
    @sardorsattorov9914 11 місяців тому +1

    bro i cannot handshke whats my problem

  • @jli2133
    @jli2133 Рік тому +4

    Hi Pat,very cool made video.I just have one question,I tried this method on my Router and it worked but when I tried this to other WPA2 Routers surrounding me,I got 0 handshakes.I don't think that none of the Routers were reconnected during/after the Deauth attack,and they all got stations connected.How is this happening?

    • @InfoSecPat
      @InfoSecPat  Рік тому +1

      Nice at least you got it to work on your router and you tested the technique. Maybe the other routers the passwords are more secure or your Ward list doesn’t have that. Or the clients are not getting disconnected.

  • @bazileu_
    @bazileu_ Рік тому

    why you need to use a word list if you got the handshake?

  • @Josh-jpg
    @Josh-jpg 4 місяці тому +1

    Hey im in the end step when i will put the word list in and i can put it in even the rockyou.txt

  • @dhaliabir
    @dhaliabir Рік тому +1

    What should I do if the password file I have does not contain the key?

    • @InfoSecPat
      @InfoSecPat  Рік тому +1

      You have to use a password list that may contain the file in this video. It’s only for educational purposes and understand how it’s done.

  • @Ton_DayTrader
    @Ton_DayTrader Рік тому +1

    How to crack with not use Dictionary ?

    • @InfoSecPat
      @InfoSecPat  Рік тому +1

      You can use other techniques like automated Wi-Fi pen, testing tools

  • @bliike-z4205
    @bliike-z4205 Рік тому +2

    Why my terminal so slow

    • @InfoSecPat
      @InfoSecPat  Рік тому +1

      Idk why it’s slow. How much ram you have?

  • @DrGreenThumBxD
    @DrGreenThumBxD 10 місяців тому +1

    hi everyone, in my case there is no such thing like Password.txt ...... WHYYYY

    • @InfoSecPat
      @InfoSecPat  10 місяців тому

      That’s a password list that I created.

  • @fared00
    @fared00 9 місяців тому

    Everything is going well, but when I enter the (ls) command, there is no such thing as password.txt. help sir thanks

  • @dollyguarana7077
    @dollyguarana7077 Рік тому +31

    Found your channel when I was looking for a Windows Server Training playlist and have been loving it so far! Nice content... and also nice beard, damn!
    Você tem um admirador do Brasil ;)

    • @InfoSecPat
      @InfoSecPat  Рік тому +4

      Thank you for the comment and watching the videos. I’m glad you enjoyed my videos 😎. I appreciate it.

  • @MuhammadAsifAli-kd3vn
    @MuhammadAsifAli-kd3vn Місяць тому +3

    password.txt file link me please

    • @InfoSecPat
      @InfoSecPat  Місяць тому +1

      That’s a list I made with a few password La and I included for demo purposes the one that was cracked.

  • @alaahussen2667
    @alaahussen2667 Рік тому

    Can you decompile the handcheck file please
    I could not decompile the file

  • @batonrougehistoryclass5194
    @batonrougehistoryclass5194 2 місяці тому +1

    Bro I just want to pay my game

  • @Rubalix
    @Rubalix 3 місяці тому

    I don’t want to know how to use it. I want to learn how it works, so I can make my own version of it.

  • @alexandrakomar1080
    @alexandrakomar1080 Рік тому +1

    just out of curiosity why do i need an external wireless card even for laptop?

    • @InfoSecPat
      @InfoSecPat  Рік тому +1

      Cause it needs packet injection

  • @pc-szrot
    @pc-szrot Рік тому +2

    you just add your paswoed to your wordlist thats why is so quick

    • @InfoSecPat
      @InfoSecPat  Рік тому +2

      Yeah, because it’s an educational video on how the process is done

    • @pc-szrot
      @pc-szrot Рік тому

      @@InfoSecPat I would like to see how it is done in real conditions, where the victim is far away, but not so far away that the connection will be impossible, such a test requires two people, one comes up with a quite complicated password and allows the second person to try to crack such a password

    • @korrekturensohn_
      @korrekturensohn_ Рік тому

      wow. finally someone with a brain....

  • @alicomando1195
    @alicomando1195 10 місяців тому +1

    Can i use aircrack ng in termux android smartphones?

  • @caritanrhizzyjaya.4293
    @caritanrhizzyjaya.4293 9 місяців тому +1

    Why there's no password.txt in my file??

    • @InfoSecPat
      @InfoSecPat  9 місяців тому +1

      That file is my own

  • @HealerPara
    @HealerPara 9 місяців тому

    Doesnt make sense something is really missing

  • @ChhYeang
    @ChhYeang 4 місяці тому +1

    how to use aircrack-ng without rockyou

  • @googlelimp9834
    @googlelimp9834 11 місяців тому +1

    yeah mate mine is just showing 2 with no wreless extenstions on it??

    • @InfoSecPat
      @InfoSecPat  11 місяців тому +2

      Just make sure the driver is installed for your wireless card

  • @dennissignar297
    @dennissignar297 Рік тому +1

    How to do this in Android using Termux? Tell me please

  • @sashadobre346
    @sashadobre346 Рік тому

    For me it’s not wlan 0, what is it then ? I’m stuck there

  • @pengemotbatu
    @pengemotbatu Рік тому +2

    bro i not found eapol, how to fix it?

    • @InfoSecPat
      @InfoSecPat  Рік тому +1

      Make sure you did all the steps