How to hack wpa 2psk wifi by Android phone
Answers
Answer:
OK, pull up a chair. This is going to be kind of long. I’m going to attempt to explain the KRACK attack, first discovered Mathy Vanhoef, a postdoctoral student at the University of Leuven in Belgium.
When your computer, or your smartphone, or whatever your device is, joins a WiFi network it negotiates what is called a 4-way handshake. This is to make sure that both your device and the router have the same Pre Shared Key (PSK), in other words, the same password.
To explain the 4-way handshake as simply as possible,
1. the access point (probably the WiFi router) sends a long random number to your device.
2. the device uses the long random number it just received, plus parts of the password in the form of a cryptographic key, plus the device’s MAC address back to the router
3. the router sends back to the device the router’s MAC address, plus a new group cryptographic key based on the above numbers. This group cryptographic key will be used for all the later WPA2 encrypted communications between router and device.
4. the device acknowledges that it received the above.
If step 4 (the device acknowledgement) isn’t received by the router, it can resend step 3 several times. When the router resends step 3, your device installs the group cryptographic key again and resets its counter.
OR, if someone attacking the WPA2 encryption is listening during this process then the attacker (instead of the router) can replay this step 3. Even if the meaning of the step 3 isn’t known. Just replaying the step 3 message over the radio waves installs the group cryptographic key again and resets your device’s counter.
OK, you ask, what’s the value of this to an attacker? The answer is a bit difficult to understand, but the simplified version is that if you can force this reset, you can gather information about the keys being reused, and packets of data can be forged, decrypted, or replayed. If your WPA2 uses AES (not TKIP) and your device is running macOS, iOS, or Windows it’s more a bit more difficult but still possible to exploit. But in some devices (notably Android phones and most Linux computers) this attack makes the device install a known key (made up of all zeroes), which means that it’s trivial to see everything on the network.
So, after that overlong explanation, the answer to your question—to hack WiFi using WPA2 PSK encryption, you can use the KRACK attack.