Hello readers! We know what you thinking here… “top hacking tools” another article which describe top hacking tools for penetration testing. Yes you are right we will tell about the best and best tools that any hacker must use on Kali Linux.
Kali is a Debian-derived Linux distribution designed for digital forensics and penetration testing, the first version of which was released in 2013 (Wikipedia).
To appreciate the power of internet these days it is important to able to use some tools. Below are the list of 10 must have hacking tools for kali linux (any version).
Tools_for_Kali_Linux_top#
aircrack-ng
aircrack-ng is an 802.11 WEP and WPA2-PSK key cracking program that can recover keys once enough data packets have been captured (Wikipedia). It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools(onlinehackingstuff.com) . This tool requires a good wireless card which supports rfmon mode. Most popular cards that support rfmon mode are Alfa cards with ath9k_htc driver and atheros chipsets. To install this tool on kali linux type:
aircrack-ng -r capture1.cap -b 00:14:6C:7E:40:80 mon0
Where,
-r is used for reading packets from capture file
-b is used for specifying what should be the ESSID of AP should be to crack its password
Here are some screenshots of the above command in action. The first one shows what happens when it starts capturing packets while the other one shows that WEP key has been cracked successfully.
airdecap-ng
airdecap-ng is a tool for converting wireless packets to Ethernet frames and vice versa (Wikipedia). This tool is required for running the next top hacking tools which use frame injection. So it’s advised to install this program as early as possible in case if you skipped it for some reason. However, Aircrack-ng suite already includes it so no need to install separately:
To run this program type:
airdecap -r capture1.cap -w outfile2.cap
Where,
–r is used for reading packets from capture file and saving every field inside of packet according its name inside file
–w is used for saving packets in pcap file format
ifenslave
ifenslave is used for bonding multiple network interfaces into one master and its slaves(Wikipedia). This tool is required only if you are planning to use multi carder method on a single machine. For example, you want use your machine as the Wi-Fi adapter and wired Ethernet at the same time. Here are some steps which will help you understand better:
1) Plug in your wireless device inside virtual box/Kali Linux VM
2) Run iwconfig it will show the list of available wireless cards
3) Type airmon-ng check kill monX where X represents number of wireless card (for example if my wireless is wlan0 then number will be 0)
4) Now type ifconfig the output will show the list of available cards
5) Type ifenslave <wlanX> <ethX> for example ifenslave wlan0 eth1
6) After this you can use your wireless card with wired connection using either dhcp or static ip
7 ) To un-bond just type ifconfig <interface name> down followed by ifconfig <interface name> up where interface name is taken from step 5.
Where, <interface_name> is used to define which one should be treated as master and slave in our case it is wlan0 and eth1. So my command will look like this: ifconfig wlan0 down followed by ifconfig wlan0 up.
The above command will result in a successful bonding of wireless and wired cards. To check the same just type iwconfig to see what happens. In this way you can use multi carder method with your single machine as shown below:
airtun-ng – creates virtual tunnel interface
This tool is used for creating virtual tunnel interfaces similar to ifconfig (Wikipedia). So in order to run this tool you must install it:
a) If you are using kali linux type:
“apt-get install airtun-ng”
b) If you are using Backtrack 5 R3 type:
“./configure && make && sudo make install”
Now, It’s time to use the tool. This is how it works:
airtun-ng <iface> [options] where iface is enabled wireless interface(mon0), and options can be -B for bridged mode -C will show all available containers and bridges -t specifies the tunnel type and its possible values are ipip, sit, or any other vti capable kernel module For example, type in kali linux: airtun-ng mon0 -B to create a bridge. Another example is below:
airtun-ng wlan0 -B This will also create a bridge for the given wireless card. If you are using Backtrack 5 R3 then just type ./airtun-ng instead of airtun-ng and that’s it.
ifconfig
ifconfig is used for configuring the kernel-resident network interfaces (Wikipedia). This tool creates virtual tunnel interfaces similar to Airtun-ng so no need to install Airtun-ng separately because ifconfig already includes it so no additional work needed on your part. To check what happens when both the tools installed together try creating a bond interface using ifconfig as shown below:
1) Plug in your wireless device inside virtual box/Kali Linux VM
2) Run iwconfig it will show the list of available wireless cards
3) Type airmon-ng with with if ifconfigconfig and and A Airtirtunun–ngng command command.. ..
4) Now type ifconfig the output will show the list of available cards
5) Type ifenslave <wlanX> <ethX> where X represents number of wireless card (for example if my wireless is wlan0 then number will be 0)
6) After this you can use your wireless card with wired connection using either dhcp or static ip
7 ) To un-bond just type ifconfig <interface name> down followed by ifconfig <interface name> up where interface name is taken from step 5.
If you want to use a non-bridge mode for airtun-ng tool then try below command:
If you are using kali linux: airtun-ng mon0 -B –dev tap0
If you are using Backtrack 5 R3: ./airtun-ng mon0 -B –dev tap0
Where, <interface_name> is used to define which one should be treated as master and slave in our case it is wlan0 and eth1. So my command will look like this: ifconfig wlan0 down followed by ifconfig wlan0 up. The above command will result in a successful bonding of wireless and wired cards. To check the same just type iwconfig to see what happens. In this way you can use multi carder method with your single machine as shown below:
Arpspoof
Arpspoof is a tool that implements the man-in-the-middle attack against LANs. It can be used to perform such attacks as ARP poisoning (Wikipedia). In such type of attack, an attacker forwards packets between two hosts on the local area network by forging source IP and MAC addresses. As a result, traffic goes between those two systems without any interference from the attacker’s system (GitHub). If you want to know about arpspoof then watch this video:
In order to use Arpspoof we first need to install it:
a) If you are using kali linux type:
“apt-get install arpspoof”
b) If you are using Backtrack 5 R3 type:
“./configure && make && sudo make install”
Now, It’s time to see how it works. For this just type arpspoof -i mon0 and press enter you will get a successful output if your card is present inside virtual machine otherwise it will show the list of available cards. If you have successfully installed above mentioned tools then also try airmon-ng check kill command as well as airmon-ng start wlan0 followed by iwconfig to see what happens.
Macchanger
We all know that every time we sniff packets from wireless network or perform MITM attack we need spoof our mac address so victim host think we’re one of their trusted host. In order to do this we need a spoofed mac address and the only way to get it is by using Macchanger tool.
a) If you are using Kali Linux type:
“apt-get install macchanger”
b) If you are using Backtrack 5 R3 then type:
“./configure && make && sudo make install”
After installing successfully now try below commands one by one to see what happens inside your virtual box/Kali linux VM: ifconfig wlan0 hw ether 00:11:22:33:44:55 or iwconfig wlan0 essid abcdefg if the above command doesn’t work for you then try airmon-ng check kill command
Wifite
This tool is a very good combination of aircrack and reaver tool. It derives it’s power from these two tools. But in my personal opinion, I think it’s easier to use this one rather than using both because you have to run only one command to automate the whole process of cracking wifi password much like Hydra tool which requires extensive knowledge about how it works under its hood. In order to start using wifite type: “wifite -h” after that follow instructions given on your screen by wifite itself. After doing all above mentioned steps, i believe you will become a pro at cracking wireless password in Kali Linux/Backtrack 5 R3 or any other windows operating system. For more information on Kali Linux visit our website: https://hindiscitech.com/
kali-linux/
And for more information on Backtrack 5 R3 visit our website: https://hindiscitech.com/backtrack5-r3/
Thank you for reading my article and don’t forget to share it with your friends. If you have any queries regarding cracking wifi password in Kali Linux or Backtrack 5 R3 then contact us we will be happy to help you out, subscribe to Hindiscitech Blog and like us on Facebook: https://www.facebook.com/HindiTech.Blog . Hope you enjoyed this post as much as I enjoyed writing it! !! 🙂 Cheers!! Your suggestions are very valuable to me so feel free to comment below! 🙂 Thank You!! If you