We know that nowadays if anyone of us finds free open WiFi our happiness is at the next level. Well doesn’t it sound super cool to hack someone who is using the same open WiFi which we are using? If yes then let’s check out a way to make this thing happen.
We will require the following tools:
- Kali Linux or other Linux with required tools installed: Kali Linux is an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking, and network security assessments.
- Nmap: Nmap is a free and open-source network scanner. It is used to discover hosts and services on a network by sending packets and analyzing the responses.
- arpspoof: ARP stands for Address Resolution Protocol. Whenever we connect our device to the WiFi network then ARP assigns a unique IP address to us and stores our device MAC address in ARP table and arpspoof simply spoof these requests.
- Wireshark: It is an open-source packet analyzer used for network analysis and troubleshooting.
Steps to Hack an Open WiFi
Step 1: Connect to the target network and run following command in the terminal:
The above command is used to find the gateway address where our traffic is flowing.
Step 2: Next step is to use nmap to find the different hosts connected to the network by executing the following command:
nmap -sP -n "gateway address/ip range"
With this command, we will find all the connected hosts to our target network with their IP address and also their MAC address.
Step 3: Enable IP forwarding using the command:
echo 1 > /proc/sys/net/ipv4/ip_forward
Step 4: To get victim traffic on our device, we will be using arpspoof command. For arpspoof command we require to know the interface on which we carry out the attack, for that run the following command:
Now run the following command:
arpspoof -i wlp3s0 -t "victim host ip address" -r "our ip address"
We have spoofed the victim’s device that his router address has been changed to our IP address, now we can intercept all of the traffic.
Step 5: Finally to intercept the victim’s traffic we are going to use Wireshark and all we have to do is use the victim’s IP Address. Let’s say we only want to have HTTP traffic, we can use the following query:
http && ip.addr == "victim's ip address"
Attention reader! Don’t stop learning now. Get hold of all the important DSA concepts with the DSA Self Paced Course at a student-friendly price and become industry ready.
- How to Hack WPA/WPA2 WiFi Using Kali Linux?
- Difference between WiFi Repeater and WiFi Extender
- Difference between WiFi Extender and WiFi Booster
- Why should you not Hack Facebook!
- Wifi protected setup (WPS)
- Difference between WiFi and HotSpot
- Difference between LiFi and WiFi
- Difference between Wifi and Internet
- Wifi protected access (WPA)
- Difference between WiFi and WiMax
- Indoor Navigation using WiFi
- Difference between WiFi and 3G Technology
- How to Show all the previously connected WiFi Networks using CMD in Windows?
- What is ODI(Open Data link Interface)?
- xdg-open command in Linux with Examples
- Open shortest path first (OSPF) - Set 2
- Contributing to Open Source : Getting Started
- Top 5 Open Source Java Frameworks in 2020
- Top 5 Open Source Code Editors in 2020
- Flutter | An introduction to the open source SDK by Google
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.