Thursday, February 7, 2013
How to access any password-protected Wi-Fi Network using @TamoSoft CommView for WiFi
Necessity is the mother of invention
(Mater atrium necessitas)
Anon. Latin Proverb, which means Lindsworth Deer, who lived in Rome, said this first
After the nascent and gradually rising popularity of my Geezam blog article entitled “How to access any WEP or WPA/WPA2 Wi-Fi Network that has a password on (like duh-uh!) accessing Password-protected WEP (Wired Equivalent Privacy) or stronger WPA (Wi-Fi Protected Access) encrypted Wi-Fi Networks, my ratings in the ACCENT Marketing Cafeteria aka Roses Cantina has fairly skyrocketed.
Muted whispers of “there goes the Wi-Fi hacker” pass my way. Especially as I’ve now received training on the new AQUOS line of products from SHARP Corp of Japan, which certifies me to handle and troubleshoot their Wi-Fi Streaming Capable line of Smart TV come Monday 21 January 2013. Still I remain humble; AQUOS brand is spreading to smartphones and eventually Tablets, fodder for another article on SHARP.
But a little Indian femme fetale complained to me that my article is for “like, nerds” who are into Linux and Open Source. Surely, there must be some Windows based Software that can be used to access password protected WEP and WPA/WPA2 encrypted Wi-Fi Networks that won’t take the entire day in a process that’s as exciting as watching paint dry?
Turns out there is, actually. After some due diligence on my part and a tipoff from a FB Fan of my blog, I located such a software package: TamoSoft CommView for WiFi 6.3. This software package is actually a wireless network monitor and analyzer for 802.11 a/b/g/n networks used by Network Administrators to analyze their Wi-Fi Networks. Best of all, it’s Windows 7/XP Professional compatible, so you can reach for your mouse while using this nifty software tool.
TamoSoft CommView for WiFi 6.3 is Nirvana for Network Protocol geeks such as myself. It has the following uses that, again, mainly appeal to Network Administrators:
1. Scan for Wi-Fi stations and access points.
2. Capture 802.11a, 802.11b, 802.11g, and 802.11n WLAN traffic.
3. Specify WEP or WPA keys to decrypt encrypted packets.
4. View detailed per-node and per-channel statistics.
5. View detailed IP connections statistics: IP addresses, ports, sessions, etc.
6. Reconstruct TCP sessions.
7. Configure alarms that can notify you about important events, such as suspicious packets, high bandwidth, utilization, unknown addresses, rogue access points, etc.
I’ve been playing with this software and trust me it works. In fact the research on this article is being done using a Wi-Fi Network whose password I’d acquired from a nearby Router.
Again, as with the previous DIY (Do-It-yourself) Geezam blog article entitled “How to access any WEP or WPA/WPA2 Wi-Fi Network that has a password, the following requirements should be on your checklist:
1. USB Wi-Fi Adapter capable of packet injection (ask the Computer store tech!). The Alfa AWUS050NH USB Wi-Fi Adapter is best; buy it on Amazon.com with your Scotia VISA Debit Card. Tell ‘em it’s for Science Research
2. Notepad and a Pen. Yes, you’ll have to take notes…again
3. Desktop Computer with a CD-DVD Drive with at least 2GB RAM and 320GB Hard-Drive
4. TamoSoft CommView for WiFi 6.3 which you can torrent or be a good sport and purchase it from TamoSoft’s Website for US$400 for the basic version or US$999 for the VoIP capable Version; you’ll get more professional support there.
5. Your own WEP or WPA/WPA2-enabled Wi-Fi Network. That’s for a crash test dummy, in case you’re not up to hacking your neighbour’s Wi-Fi Network
6. Target WEP or WPA/WPA2-enabled Wi-Fi Network. The signal should be strong with people connected and actively using the Wi-Fi Network, which increases the chances of accessing the Network. Also again, preferably a neighbor you don’t like
7. Patience like Noah or Enoch in the Old Testament section of the Bible. It’s Windows 7/Windows XP Compatible folks; your mouse’ll get to run a few laps in the treadmill this time!
The steps for this DIY are straightforward and simple:
1. Click on Tools then WEP Key Recovery. Make sure you have at least 500MB of free space as a typical sessions needs to samples at least 10,000 packets to get a lock on the Wi-Fi Network’s Password.
2. After the session is complete, which may take a few seconds for 64 bit keys to several hours for 128-, 152-and 256-bit keys, select Tools then WEP Keys to view the password keys for the Wi-Fi Network analyzed.
3. That’s it! You’ve now recovered the Password for the password protected WEP and WPA/WPA2 encrypted Wi-Fi Networks.
Use your knowledge wisely folks as you travel on the Information Superhighway!
Here’s the links: