Hello Wifi Passoword

Sorry I’m not a programmer or something like that how can I understand this?

But I saw that different in Videos!

Ask the owner of the wifi network for the password. If he doesn’t provide it to you then you shouldn’t be hacking it anyway.

2 Likes

it is with a third-party wifi module.

the first-party wifi module does not let you hack anything, and in fact has no support in the official firmware. it is just used to help fix issues with the firmware. I guess you might be able to reflash the firmware on the wifi devboard to use it as a deauther but i dont think any third party firmware for the official devboard exists

you could get a separate device for this (e.g. dstike deauther) or use a computer/laptop running appropriate software to deauth devices.

There are already many linux-distro loive CDs for pen testing, etc … Just get something like backtrack linux and have fun …

1 Like

yeah, i was thinking something like kali linux
but anything with aircrack and similar should be fine
you need a wifi card with support for monitor mode (lets you read, but not transmit, wifi communications between clients and access points, without being connected to the same access point)
not all wifi cards support this (it isnt really needed by most) and even if they do they need to support it on your linux distro of choice (not all do, windows support for monitor mode and such is usually awful to nonexistent)

It’s called wifi promiscuous mode and many cards/Wifi USB adaptors (even very old ones) do support that and have drivers for Linux … Backtrack linux works great for that as long as you have a compatible wifi adaptor …

3 Likes

my laptops builtin wifi does not support it (ive always seen it called monitor mode btw, but wifi promiscuous mode seems reasonable) although my 2.4ghz-only usb wifi seems to (not sure if it actually functions correctly though, never been successful in capturing a handshake the time i tried but its possible it could work, it was a long time ago and i forgot if i actually remembered to disconnect and reconnect a device during testing)

Maybe using a USB wifi stick that does support it would help ?

1 Like

WPA2 - https://www.krackattacks.com/
WPA3 - https://wpa3.mathyvanhoef.com/

Both of these are several years old.

2 Likes

You’re hitting some valid points but I think your explanation is going over our friends head a bit.

1 Like

Then why not just try to replicate what you have saw in “different videos” that accomplish your stated aims? Also, as someone previously alluded in this thread if this is something beyond your technical ability and potentially naughty activity, perhaps it might not a good idea to be doing in the first place? Just a thought…

2 Likes

Hello, Its not that easy but here is a tutorial for it!

2 Likes

Thanks dude :pray:

I just do it to education I just want to learn more a few things!!!

Nah then I not real learn something it’s my own one what I want try to crack!!!

Mate, to “hack” a wifi password you have to get hold of the PMKID/handshake (this step in the video is seen and performed by flipper zero) once you have this handshake you are not even at the beginning… (for that matter with a simple kali linux and a wireless card that supports monitor mode “$40” you can do the same),
anyway once you have the handshake you have to do a bruteforce in 2 ways;

  • Using password list (Dictionary Attack) or randomly.

In the video you can clearly see that it uses hashcat program for bruteforce the handshake.

So in a nutshell either the password that is set on the router is in your password list and that way in a moment you can decrypt the handshake, otherwise with a random bruteforce you risk taking years to crack the password…

Obviously who is expert in cryptography maybe can launch more targeted commands but the same it takes long time (for a password of 8 characters without symbols without uppercase letters or numbers a pc with nvidia 3070 GPU takes several hours anyway) think adding numbers symbols and uppercase letters…

However I will make you aware that some routers (old ones) have the WAP protocol that has a security flaw try to inquire about that one it certainly makes more sense.

From what I heard , an Israeli hacker with a backpack and I wifi pineapple (or something similar) used hashcat dictionary and brute forced 8 numeric digits ?d?d?d?d?d?d?d?d. SEPARATELY not at the same time. And was able to crack 75% of the 6500 networks he had obtained . Pkmid blah blah … I’ll just post the link.

I’m not sure if this mentions the Israeli hacker but it does explain the hack and it’ll help all find a way…

It helped me.

You can flash your dev board and use the marauder file to deauth most wifi accounts. You can then capture a handshake and decrypt to get the password.

LOL… if you use the flipper zero to deauthorize people from their networks and hope to gain passwords in this way then you’ll be arrested.

You would have to continuously death a client for hours which would lead to your arrest. The flipper is more of a POC device for “CAPTURING HANDSHAKES”… not for gathering the data needed to crack network passwords.

It’ll work on your own network because you won’t call the police on yourself.

So long story short… If you try this on other peoples’ network… you will and you deserve to be thrown in prison.

Don’t believe all the shite on watch on youtube and tiktok.