We know that nowadays if anyone of us finds free open WiFi our happiness is at the next level. Well doesn’t it sound super cool to hack someone who is using the same open WiFi which we are using? If yes then let’s check out a way to make this thing happen.
We will require the following tools:
- Kali Linux or other Linux with required tools installed: Kali Linux is an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking, and network security assessments.
- Nmap: Nmap is a free and open-source network scanner. It is used to discover hosts and services on a network by sending packets and analyzing the responses.
- arpspoof: ARP stands for Address Resolution Protocol. Whenever we connect our device to the WiFi network then ARP assigns a unique IP address to us and stores our device MAC address in ARP table and arpspoof simply spoof these requests.
- Wireshark: It is an open-source packet analyzer used for network analysis and troubleshooting.
Steps to Hack an Open WiFi
Step 1: Connect to the target network and run following command in the terminal:
The above command is used to find the gateway address where our traffic is flowing.
Step 2: Next step is to use nmap to find the different hosts connected to the network by executing the following command:
nmap -sP -n "gateway address/ip range"
With this command, we will find all the connected hosts to our target network with their IP address and also their MAC address.
Step 3: Enable IP forwarding using the command:
echo 1 > /proc/sys/net/ipv4/ip_forward
Step 4: To get victim traffic on our device, we will be using arpspoof command. For arpspoof command we require to know the interface on which we carry out the attack, for that run the following command:
Now run the following command:
arpspoof -i wlp3s0 -t "victim host ip address" -r "our ip address"
We have spoofed the victim’s device that his router address has been changed to our IP address, now we can intercept all of the traffic.
Step 5: Finally to intercept the victim’s traffic we are going to use Wireshark and all we have to do is use the victim’s IP Address. Let’s say we only want to have HTTP traffic, we can use the following query:
http && ip.addr == "victim's ip address"
Don’t stop now and take your learning to the next level. Learn all the important concepts of Data Structures and Algorithms with the help of the most trusted course: DSA Self Paced. Become industry ready at a student-friendly price.
- How to Hack WPA/WPA2 WiFi Using Kali Linux?
- Difference between WiFi Extender and WiFi Booster
- Why should you not Hack Facebook!
- Difference between WiFi and HotSpot
- Difference between Wifi and Internet
- Indoor Navigation using WiFi
- Difference between LiFi and WiFi
- Wifi protected access (WPA)
- Wifi protected setup (WPS)
- Difference between WiFi and WiMax
- Difference between WiFi and 3G Technology
- How to Show all the previously connected WiFi Networks using CMD in Windows?
- What is ODI(Open Data link Interface)?
- Contributing to Open Source : Getting Started
- Open shortest path first (OSPF) - Set 2
- xdg-open command in Linux with Examples
- Flutter | An introduction to the open source SDK by Google
- Top 5 Open Source Code Editors in 2020
- Making your first Open Source Pull Request | Github
- How to begin Contributing to DuckDuckGo’s Open Source Community
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.