HOW TO GET YOUR NEIGHBOR'S WIFI FOR ABSOLUTE FUCKING BAKAS
(just kidding some knowledge is needed.)
Take a look at the bottom of your ISP provided router, If your wifi password is 10 or less numerical digits,
theres a chance that all the other ISP provided routers in the area use the same password generation scheme.
2wire does this alot on their routers. Use a mac address lookup site to make sure you are cracking the
same model of router to decrease likelyhood of wasted time.
My fairly underpowered GPU cracks at 14000 hashes a second using Hashcat so going through the ten billion
possible permutations of 10 numerical digits takes only 7 days, and I'm sure that a retired mining rig could
get through these signifigantly faster.
This can be exploited with programs like aircrack-ng and oclHashcat/cudaHashcat. airodump-ng should be used
to capture your target router's encrypted handshake packets but i suggest using oclHashcat or cudaHashcat
when it comes to the actual password cracking, because hashcat uses the GPU and GPUs are very good at
parralelized tasks like password cracking.
There are tons of tutorialz on wifi cracking so I'm not going to write a full one here. but I will link to a good
number of useful resorces.
https://aircrack-ng.org/doku.php?id=cracking_wpa CPU cracking. Still useful to read the bits on handshake interception.
https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2 GPU cracking.
https://hashcat.net/wiki/doku.php?id=mask_attack mask attack is used because you would need 102GB to store a wordlist this big.
https://hashcat.net/files/hashcat-4.2.1.7z required toolz 1/2
https://download.aircrack-ng.org/aircrack-ng-1.4.tar.gz required toolz 2/2 (in source code form)
https://www.blackmoreops.com/2014/03/27/cracking-wpa-wpa2-with-hashcat-kali-linux/3/ another guide.
if you need more information:
(((https://duckduckgo.com)))
searx.me