On the left hand side choose MAC Addresses.Right click the desired network and click on copy MAC Address.To capture packets only from the desired network follow the given steps. Now you might notice that packets are being captured from all the networks in the particular channel. Once you have chosen your target network,select it and click Capture to start capturing packets from the desired channel. Make sure the WEP network you are choosing has the least the least dB (decibel) value.Each network will have its details in the right column.Choose a network with the highest signal.So make sure you select a network with WEP next to its name This tutorial is only for WEP encrypted networks.Now it is time to choose your target network Step 2: Selecting the Target Network and Capturing PacketsĪ few things to keep in mind before choosing the target wireless network After a few minutes you will have a long list of wireless networks with their security type and signal.
Follow the prompts to install the driver for your wireless card. When CommView opens for the first time it has a driver installation guide. Extract the file and run setup.exe to install CommView for Wi-Fi.
This software will be used to capture the packets from the desired network adapter. Click here to check if your wireless card is compatible This ensures that the wireless card can go into monitor mode which is essential for capturing packets. This is by far the biggest requirement.The wireless card of your computer has to be compatible with the software CommVIew.
If the only networks around you use WPA passwords, you’ll want to follow this guide on how to crack WPA WiFi passwords instead. Hacking WEP passwords is relatively fast, so we’ll focus on how to crack them for this guide. That is, unless the WPA PIN is still enabled (as is the default on many routers).
Although this can also be cracked using a wordlist if the password is common, this is virtually uncrackable with a strong password. Variations include WPA-2 which is the most secure encryption alternative till date. In other words you use the old fashioned method of trial and error to gain access. Efficient cracking of the passphrase of such a network requires the use of a wordlist with the common passwords. Although this is the case many people still use this encryption. This has become an unsafe option as it is vulnerable and can be cracked with relative ease. This is the most basic form of encryption. If you somehow manage to get hold of the key for a particular wireless network you virtually have access to the wireless internet connectionīroadly speaking there are two main types of encryptions used: These packets are encrypted with network security keys. In a secured wireless connection, internet data is sent in the form of encrypted packets.