How To Hack Neighbors WiFi | AirSlax 2021 - Free Download - Google Drive Links

Neighbor’s wi-fi hacking / Airslax 2021

If you don’t know much about Kali linux, then this method will be just gorgeous for you.
One of the items is to download AirSlax and create a download stick. The utility interface offers graphical options.
The first priority before installing AirSlax is to download the ISO image of the program. You can do it for free right from our portal. The second necessary action is to change the boot device in BIOS.

The software loader provides maximum automation. To make the USB flash drive system, just follow simple AirSlax installation instructions:

• Place a USB device in the appropriate computer port
• Unpack the installation package on a mobile medium;
• Go to the “boot” directory;
• Run the appropriate installer, the folder contains two files for Windows and Linux.
• In the window that appears, press any key or “x” to stop the process.
• After the restart, install a USB HDD download in BIOS.

Program Menu:

  1. Scan - Scan ether

  2. Choice - Select Target
    3)Intercept - Target Intercept q

  3. Customer - Disable Customer

  4. Rebound - WPA Password Pick - Save - Save - Save the result WEP - WEP Password Selection

  5. WPS Scan - Scan WPS

  6. WPS Selection - WPS PIN selection

  7. Automatic. - Auto-picking
    and interception

  8. Scan - Scan ether Scans all wifi channels, saves information about all visible access points and connected customers (customer information is needed to speed up the interception process).
    The top of the list is the access points, the bottom - customers connected to the hotspots.
    In the customer list the first column - MAS address the point to
    which the client is connected (it coincides with the MAS in the list of access points) give the program time to accumulate more information.
    Close this window and move on to the next point.

  9. Choose a target Selecting an access point for the attack and one of the customers connected to it.

  10. Intercept -Intercept the target Intercept packages going to/from the selected access point, waiting for the
    appearance of the handshack (in the upper right corner of the window should appear the inscription “WPA HANDSHAKE”) Do not close this window before holding the next item!

  11. Disconnect the client because the handsshake passes only at the moment of connection of the client to the access point, help the client to disconnect from the access point, so that he can then reconnect to it and give us a hand-neck, p.3 “The Intercept” should be launched at the same time.
    If the handler does not appear the first time, try several times (but give the customer 30-120 seconds to try to connect) if this client does not work, you can choose another through p.2 “Choice” (but choose the tight access point, the interception of which you lead), the interception can not stop.
    You can also choose n." Disconnecting all" - not as effective as with one client, but sometimes triggers.
    if nothing helps to knock the customer out of the network, but really want to catch a hands-on, you can leave the interception running until the customer himself does not connect to the access point.
    after p.4, you can try to conduct p.5 “Hacking” because “The Intercept” does not always clearly define the appearance of the handshack, especially if the signal of the access point or the customer is not very good.

  12. Selection - Choosing a WPA password When the handler is caught, you can go to the selection of the password by dictionary (a small dictionary is included, you can use your dictionary, put it in the folder "slax"dict) In case of successful selection will be the inscription KEY FOUND!
    [ password ] (in brackets instead of “password” will show the password). If the password is not picked up, passphrase does not appear in dictionary.
    If the selection has not been successful contact here WiFi password selection, here will help you!

  13. Save the result Save the result
    Of the interception for further work with it in a separate folder (on the flash drive folder “dump” result) the file will be called by the name of the access point with the expansion .cap and will be cleared of excess debris accumulated during the interception process.

  14. WEP - Wep
    Password Selection Hacking Networks with WEP
    Encryption. You need to complete the first three points of the program, leave the Intercept running and run P.7 WEP. Hacking WEP takes an average of 5-10 minutes. He doesn’t need dictionaries. If you successfully carry out an attack, the password is selected 100% of the time.

  15. Scan WPS -
    Scan WPS Search points supporting authorization under WPS

  16. WPS Selection - Matching
    the WPS PIN, select the access point from the list and select the
    PIN. The selection process is long, from 2-3 hours to several days, depends on the “collusion” of the access point, but allows you to open passwords of any complexity.
    Automatic. - Auto-picking
    and interception Automatic search, interception of WPA hand-necks, selection of WEP-networks passwords.
    Try not to abuse this function, because it is pretty much littered on the air.

Tools You require!

Happy learning!