Welcome to how to hack wifi where I will teach you how to crack or hack WIFI or Wireless network so you can have free internet forever! Now, just before we begin talking about it I wanna tell you that cracking or hacking is totally illegal and you can get into a lot of trouble for doing that, do it only if that is your WIFI network!
Guys recently YouTube and the internet has been bombarded with so called magic "WIFI HACKING SOFTWARE" that can hack WIFI network password in seconds! That is totally scam! That wifi hacking software is nothing else than a fishing software made using Microsoft Virtual Basic software designed to send you to the web site like FileIce and ShareCash where those people will make money out of you! Some of them even trojan horses! I know it is very tempting, because who wouldn't want to be able to hack WIFI network without spending so much time and effort to do that! That is why it is out there! There are a lot of legitimate ways to hack WIFI network and one of them is the best called BackTrack! So don't fall into the trap with this "pay per download" scam!
By reading this you agree: That hacking – cracking WiFi or Wireless network password is illegal and everything you're about to learn here is for education purposes only and should not be used for any illegal or criminal activities as I will not be responsible for any trouble you may get into by hacking public WiFi or Wireless networks! My intentions here is to show you how vulnerable WiFi network security really is so YOU can better protect yourself form WiFi network hacks. All the hacking and cracking was done using my own router.
All right so basically what you need to know is that there are three encryption methods you can use to protect your WIFI or Wireless signal! WEP, WPA, WPA2.
I am not going to be explaining about WEP, WPA, WPA2, because you don't need to know all that however you need to know the basics!
1). WEP - Wired Equivalent Privacy.
Is a security algorithm for IEEE 802.11 wireless networks.
WEP, recognizable by the key of 10 or 26 hexadecimal digits, is widely in use and is often the first security choice presented to users by router configuration tools. Although its name implies that it is as secure as a wired connection, WEP has been demonstrated to have numerous flaws and has been deprecated in favour of newer standards such as WPA and WPA2!
Standard 64-bit WEP uses a 40 bit key (also known as WEP-40), which is concatenated with a 24-bit initialization vector (IV) to form the RC4 key. At the time that the original WEP standard was drafted, the U.S. Government's export restrictions on cryptographic technology limited the key size. Once the restrictions were lifted, manufacturers of access points implemented an extended 128-bit WEP protocol using a 104-bit key size (WEP-104).
A 64-bit WEP key is usually entered as a string of 10 hexadecimal (base 16) characters (0-9 and A-F). Each character represents four bits, 10 digits of four bits each gives 40 bits; adding the 24-bit IV produces the complete 64-bit WEP key. Most devices also allow the user to enter the key as five ASCII characters, each of which is turned into eight bits using the character's byte value in ASCII; however, this restricts each byte to be a printable ASCII character, which is only a small fraction of possible byte values, greatly reducing the space of possible keys.
A 128-bit WEP key is usually entered as a string of 26 hexadecimal characters. Twenty-six digits of four bits each gives 104 bits; adding the 24-bit IV produces the complete 128-bit WEP key. Most devices also allow the user to enter it as 13 ASCII characters.
A 256-bit WEP system is available from some vendors. As with the other WEP - variants 24 bits of that is for the IV, leaving 232 bits for actual protection. These 232 bits are typically entered as 58 hexadecimal characters. ((58 × 4 bits =) 232 bits) + 24 IV bits = 256-bit WEP key.
2). WPA - WPA2 – WIFI Protected Access and WIFI Protected Access II
Are two security protocols and security certification programs developed by the WIFI Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, WEP - Wired Equivalent Privacy. A flaw in a feature added to WIFI called WIFI Protected Setup, allows WPA and WPA2 security to be bypassed and effectively broken in many situations. WPA and WPA2 security implemented without using the WIFI Protected Setup feature are unaffected by the security vulnerability. The WIF Alliance intended WPA as an intermediate measure to take the place of WEP pending the availability of the full IEEE 802.11i standard. WPA could be implemented through firmware upgrades on wireless network interface cards designed for WEP that began shipping as far back as 1999. However, since the changes required in the wireless access points (APs) were more extensive than those needed on the network cards, most pre-2003 APs could not be upgraded to support WPA.
The WPA protocol implements much of the IEEE 802.11i standard. Specifically, the Temporal Key Integrity Protocol (TKIP), was adopted for WPA. WEP used a 40-bit or 104-bit encryption key that must be manually entered on wireless access points and devices and does not change. TKIP employs a per-packet key, meaning that it dynamically generates a new 128-bit key for each packet and thus prevents the types of attacks that compromised WEP.
WPA also includes a message integrity check. This is designed to prevent an attacker from capturing, altering and/or resending data packets. This replaces the cyclic redundancy check (CRC) that was used by the WEP standard. CRC's main flaw was that it did not provide a sufficiently strong data integrity guarantee for the packets it handled. Well tested message authentication codes existed to solve these problems, but they required too much computation to be used on old network cards. WPA uses a message integrity check algorithm called Michael to verify the integrity of the packets. Michael is much stronger than a CRC, but not as strong as the algorithm used in WPA2. Researchers have since discovered a flaw in WPA that relied on older weaknesses in WEP and the limitations of Michael to retrieve the key stream from short packets to use for re-injection and spoofing.
WPA2 has replaced WPA. WPA2, which requires testing and certification by the WIFI Alliance, implements the mandatory elements of IEEE 802.11i. In particular, it introduces CCMP, a new AES-based encryption mode with strong security. Certification began in September, 2004; from March 13, 2006, WPA2 certification is mandatory for all new devices to bear the WIFI trademark.
Pre-shared key mode (PSK, also known as Personal mode) is designed for home and small office networks that don't require the complexity of an 802.1X authentication server. Each wireless network device encrypts the network traffic using a 256 bit key. This key may be entered either as a string of 64 hexadecimal digits, or as a passphrase of 8 to 63 printable ASCII characters. If ASCII characters are used, the 256 bit key is calculated by applying the PBKDF2 key derivation function to the passphrase, using the SSID as the salt and 4096 iterations of HMAC-SHA1.