Wifislax is a Linux distribution used for the security audit of wireless networks arising from Wifiway and stands out for including a series of scripts adapted to the networks available in Spain. With it, we can check the security of our router and decrypt its WiFi passwords.
Download Wifislax 4.7
On the web www.wifislax.com we will find the latest available versions of Wifislax .
At the time of creating this tutorial, the most recent final version of Wifislax was 4.7, although 4.8 was already available in Release Candidate 3 (just the previous phase to become final).
In particular, you can download Wifislax 4.7 from www.wifislax.com/wifislax-4-7-2 , through the direct download server DepositFiles. Yes, arm yourself with patience, since it weighs more than 600 Mbytes and if you do not have an account in this service and opt for the free download (or regular) it may take about an hour to be ready.
Installation or direct use
As Wifislax is a Linux distribution (based on the Slackware project ) it can be used in different ways: either installed on the hard drive as an operating system or (more practical) run from a CD ( LiveCD ) or a flash memory ( LiveUSB ).
Once we have downloaded the program, we will mount the ISO image file on a LiveCD or LiveUSB, and with the medium, we obtain we can start Wifislax directly or install it permanently if we prefer it. By opting for the Live version, our system will not be modified at all, and when you finish using Wifislax, the changes we make will not be saved, either.
To create a LiveCD, use the recording utility of your choice and burn a disc from the ISO image (normally selecting the ” Record image ” option ).
If you prefer to generate a LiveUSB, you must first format the USB key in question with FAT 32 format. Unzip the ISO image that we have downloaded (for example, with WinRar) and copy the obtained folders into the external memory. All that remains is to enter the ” Boot ” folder inside the USB key and execute the ” bootinst.bat ” file so that the LiveUSB (from Windows) is generated.
Remember that to start your computer from a CD or USB media, you must first configure the BIOS to start earlier from these sources than from the hard drive.
Wifislax starts for the first time
After restarting the computer from the USB device or the CD that we have created, we can boot with a normal kernel(recommended if we have less than 4 Gbytes of RAM) or PAE (if we have more than 4).
Next, we will see options related to the desktop that will be loaded in Linux ( KDE, XFCE …), which are pertinently explained on the screen. We choose the one that we like and ready (or we try successively until we find one that does not give us problems when starting ).
Using Airoscript Wifislax
Now that we have Wifislax running, it’s time to get down to work.
We display the start menu (similar to how it is usually done in Windows) and enter Wifislax / Suite aircrack-ng. This utility is considered as the standard upon which almost all network security audit suites are based.
We open it and select our network card (if we have two, for example, ethernet card and WiFi adapter, we will select the one we want to use by dialing the corresponding number).
Next, we will have to choose a driver compatible with our network card (if we have doubts, it is best to check the first option). Then we will be ready to scan WiFi networks and check their security.
The main menu is ordered by numbers, and first, we will choose Scan (to search for networks at our reach or filter them based on the type of security or channel used) and then select to focus on the one we are going to analyze.
Start getting packages
Once we have listed our goal, with options 3 and 4 we can launch an attack, crack the network or look for the key automatically.
As an indispensable step, we will first launch an attack that will capture the network packets we have chosen.
Once we have enough packages, we will open a new window of Airoscript (without closing the previous one) and select the option Crack. We only have to wait for the program to do its job, and we will check in situ if our network is vulnerable or not to these techniques of deciphering your password.