How Hackers Hack WiFi Password and Protection

You are here

Home>Kali Linux training>Chapter 5
Now, day’s we can’t imagine our life without the internet. Wi-Fi is the most popular internet connection. That’s why Hack WiFi is most popular on Google trends from hacking. In this post, I am guiding you about how can you hack and secure your wifi. Here is the basic guide for beginners. Here I have mentioned working methods of wireless network attacks and also mention software.how to hack wifi

I always prefer Kali Linux operating system for any hacking. Kali has preinstalled all tools that are needed in wifi hacking like aircrack-ng (best software to crack a wifi). No doubt some software also available for window and android user but can’t compare with kali.




If you don’t want to install Kali Linux ( hate dual boot) then run live Kali Linux.

Also, read:
Remove virus from android

Latest 41 WhatsApp Tricks for Android
Ok in our society there are mainly five types wifi security available.

  1. WEP security
  2. WPA security OR WPA2 security
  3. MAC ADDRESS filtering
  4.  HIDDEN network
  5. WPA2 (WPS available)
  6. OPEN network

How hackers hack wifi

Here I have explained working of all mention hacking of all securities one by one

  • WEP SECURITY

 WEP stands for Wired Equivalent Privacy. This is the first security discovered of Wi-Fi invented in 1999 and crack within the year.

In today it is the world is easiest to crack. People did not understand the working of hacking WEP wifi but able hack it. There is an initialization vector send over all the network you can get password using this technique more the initialization vector capture by you easy to hack WEP security. It is crackable within 20-30 minutes. Even you have world’s strongest password you can’t protect your network

Software to crack it: aircrack Not only WEP using aircrack you can also hack other wifi passwords like WPA, wpa2a. Aircrack is available for both Window and Linux.

How to hack in the window: For getting the password in you need to install this aircrack-ng. Happy news for non-coder because there is no need to code window the window operating system. Bad news for window user is it will take 4-9 hours. Check here full process from installation to Hacking. This process is working for all window like 7.8,10

Hack in Linux: No matter which Linux distribution you are using you need only one tool again aircrack. Find out here how to install it any other Distribution. After installing, this there are some simple commands. If you are using Kali on the virtual box, you need to buy a wireless adapter. Here is cracking process

Android: No doubt in google play store thousands of fake wifi hacking apps available. But WIFI WPS WPA TESTER is working in hacking. But it will not work for all wifi, and it needs Android 5.0 or above version.

How to protect

Don’t use WEP security use any other security.

  • WPA SECURITY OR WPA2 SECURITY

When WEP become easy to crack then WPA (Wi-Fi protected access) is discovered. It has two formats WPA and wpa2 (this is advance). It is much more secure than WEP.WPA2 is more secure than WPA.

Today It is the best security to protect your network if you put a strong password. It is crackable but not always. There is mainly two methods available to hack this WPA or wpa2a

  1. Word List Attack
  2. Brute Force Attack (never sounds anybody hacks Wi-Fi using method)

Word List Attack: This is the most useful method to hack WPA. In this method, the hacker creates a word list with the help software like crunch. Where you need to tell input about the minimum, maximum length, and Character.  That’s it will make word dictionary that containing all word of characters typed by you.

After making word list, you need software that will try these words one by one.  Aircrack can try 900 words per second.  If your password is your name+anything like digit, then it is easy to crack.

Brute Force Attack: There is no big difference between Brute force and wordlist attack. In this hacker just need to give information about password minimum and maximum length, the character that containing password and then software like Reaver try a different combination of these characters. But this is only theoretical concept because it takes too much time maybe it can take seven days, and you need a strong signal for this attack, but if WPS enable in WPA2, then it can be easily hacked.

But this is only theoretical concept because it takes too much time maybe it can take seven days, and you need a strong signal for this attack, but if WPS enable in WPA2, then it can be easily hacked.

Hacking through Linux: First of all, you need a wordlist file. You can use crunch which is pre-installed in Kali Linux here how to make word list with crunch after making wordlist its time to crack wifi password. See in this videos how can you crack the password using aircrack-ng.

aircrack-ng you need to wait for a device to connect to network if you don’t want to wait then give a try to Fern wifi cracker

Window user: Hey dude it might be difficult for you hacking using window because you need to type commands. Here are soft wares which you need to crack wifi password download both

  1. Crunch 
  2. aircrack

here is the full process to get the password through the window os

How to protect
  1. Always use a strong password try to put longer password according to Kevin Mitnick your wifi password should include 20 characters.
  2. If you don’t wanna use the long password then your password at least include 1 Upper case letter one lower case letter digit one special character like,<’:”/?.\|   nowadays !@#$, etc. are not a special character.
  3. Use any other security with WPA security like mac address filtration of hiding your wireless network
  4. Reduce your network signal.
  • MAC ADDRESS FILTERING

To understand Mac address filtering you need to know what is Mac address. Mac address is hardware identity of our device, or you can say Wi-Fi address of our device. In this security only registered device are able to connect WiFi other device are unable to connect.

Read: full form of hacker

To bypass this security hacker just need to know Mac address of a registered device, and then he changes your Mac address means to make it similar to register device Mac address. Now your thinking will you can get mac address without any physical access of registered device? The answer is this question is YES. There is some software available like again aircrack it can show device are connected to a network although you did not connect.

Window Tutorial: If you are window sorry you have to know mac address of registered device manually mean no software for. Running live Kali Linux is a good choice. Anyway once you know  mac address then you can change your mac here is tutorial

Linux Tutorial: Linux is always preferred for any hacking. If you are not running Kali Linux type aircrack-ng in the terminal to know to how to install. After installation follow this process 

Android tutorial: For bypass this you have to root your phone. After rooting you can change mac address using BusyBox and terminal. Once you install, these apps follow this tutorial.

How to protect
  1. Reduce your signal.
  2. Apply any other security with Mac address filtration.
  • Hidden network

 As clear from this name it is hidden you can’t see it turning on your wifi you have to enter network name manually. In windows os when they detect hidden wifi a symbol of hidden network while connecting asking network name. On the internet, you can find software and apps available to hack this. You can also see get network name using Android or iPhone devices.

Android app: To find hidden network you need to install an app inSSIDer from google play store. This is paid app $9.99 (₹623).

Linux Tutorial: Linux will 100% working os to crack wifi password. for hidden see this video.

Note: this is Kali Linux tutorial don’t worry it will work on all distribution

Window tutorial: finding a hidden network is easy as on Windows as compared to WPA security.  Here are eight best wifi scanner.

How to protect
  1. Reduce your wifi network signal.
  2. Apply any other security with hidden wifi.
  • WPS enabled

 WPS stands for wireless protected Setup but it will insecure your network. it is also known as WPA-PSK. In this, there is 8 digit pin you can use this pin as a password. The router has 8 digit PIN that you need to enter while connecting, the router checks the first four digit separately and last four digits separately which become very easy to crack by brute force attack. WPS Wi-Fi can be hacked only in 40 minutes using pixie dust with Reaver.

Linux tutorial: you need to type some commands for this.  As you know Linux is best for any type of hacking. WPA-PSK pin code can by got by aircrack-ng software no need to install in kali and backtrack. This post will help you to know how to hack WPA-PSK (include screenshots).

Window user : you can crack this within 5 minutes or less. Install wincap and jumpStart in your window [10,8, 8.1 etc] and see this video to bypass this step by step.

Android tutorial: WPS Connect is the only app which can help you to bypass this. It is free available in google play store but makes sure that your Android version is at least 5.0 mean Lollipop and phone is rooted.

How to protect
  1. Don’t enable WPS
  • OPEN Wi-Fi

 Are thinking what is need of hacking open Wi-FiOpen network hacking means control full network. Yes, you are right that our college network. To control full Wi-Fi hacker need to hack the router. Every router has the default username and password, and in today’s world more than 90% router has their default password and if you change password, then a hacker can use brute force attack, word list attack, Man in the middle attack or keylogger to hack the router.

Read: How to hack facebook account using Android [5 ways]

I have already define brute and wordlist attack above

Kali Linux wordlist attack: Make sure you made a wordlist of username and password by default username is admin so I will suggest you try the only password field. here is the video source.

Default password: As I told you above more than 90% router have default username and password here I am providing all default username and password of all routers.

username: admin

password: password

username: admin

password:                                         (blank)

username: admin

password: secret

Keyloggers:  This is basically software that records every keystroke/character types by us. Keylogger are  mainly used to get password of Gmail, Twitter, Instagram etc. crackers can remotely install a keylogging software. This software can mail our keystroke in text form after the regular time interval. Problem is how to install in victim computer.

  • Keyloggers for window operating system: Ardamax Keylogger is the best option for window user. It has both free and paid version. In free you need to access the computer again to see record activity while in the premium version it will mail you record activity in .txt form after specific time interval.
  • For android os: shadow keylogger is my favorite app to record all text you can try, but it will not mail you.

Man in middle attack: As clear from it’s In this attack a Man in the middle between his victim and router. The victim will not realize any change, but all information can be seen by hackers.

Kali Linux tutorial 

Window tutorial here

How to protect
  1. Always change default username and password of your router
  2. Use firewalls to protect from hackers.
  3. Use D-link router which will save you from brute force, word list attack because if you type the wrong password five times, then you will not access router login page for some time
  4. Disable remote login of your wi-fi router
  5. Always use good antivirus from protecting keyloggers.
  6. To prevent man in middle attack, you need to add static ARP

Next post

Metasploit Tutorial for beginners: Master in 5 minutes

In this post, we will talk about the Metasploit framework. I am sure you have enough heard about Metasploit and maybe still confuse what is this and how to use it? It is framework mean it is the collection of number of Softwares. You can gather information, make malware, hack FTP, hack Android, and many other things. You will know when you use it. It is pre-installed in Kali or parrot OS. It has paid and free version. Off course, Kali has a free version. Not only in Kali you can install it in the window too. Metasploit is also integrated

17 Comments

  1. anonymous February 29, 2016
    • admin March 2, 2016
  2. Sneha Capoor June 23, 2016
    • Harinderpreet singh June 24, 2016
    • Harinderpreet singh August 24, 2016
  3. Akhil October 11, 2016
  4. gunjan verma October 25, 2016
    • Harinderpreet singh October 25, 2016
  5. KD SHAWN November 1, 2016
    • Harinderpreet singh November 2, 2016
  6. angelina February 13, 2017
  7. Gaurav Heera April 1, 2017
  8. manish April 12, 2017
  9. Angelina Grey April 29, 2017
    • Harinderpreet singh May 1, 2017

Add Comment

Pin It on Pinterest

Share This