Académique Documents
Professionnel Documents
Culture Documents
Hack WiFi How to crack WPA2 WiFi password using reaver (99% chance) !!
Subscribe via
Email
How to crack WPA2 WiFi
password using reaver
Enter your email address to
receive notifications of new
posts by email.
Subscribe
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com
Subscribe
5 Jun 2013 | Hack WiFi
Like Us
Today I am going to teach you how to easily hack WPA/WPA2-PSK
Hack Wifi
enabled network using reaver. But, for that the targeted router should
support WPS(WiFi Protected Setup) which is supported by most of the Like
Tw eet
router nowadays. WPS is an optional device configuration protocol for
wireless access points which make it really easier to connect. 2,526 people like Hack Wifi.
0
This feature exist in most of the router for the easy setup process through
the WPS pin which is hard-coded into the wireless access point. Reaver
takes the advantage of a vulnerability in WPS. Thanks to Craig Heffner for
releasing an open-source version of this tool named Reaver that exploits the
Subm it vulnerability. In simple tone, Reaver tries to bruteforce the pin; which in
result reveal WPA or WPA2 password after enough time.
8 Fac ebook s oc ial plugin
Share
Backtrack OS. Backtrack is a bootable Linux distribution with lots of
pen-testing tools. You can use various other Linux distribution but I
prefer backtrack. If you don`t know how to install backtrack then please
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com
check this link first.
A computer and wireless network card. I cannot guarantee if this
will work with all the internal wireless card but i recommend a external
Make Money
wireless card. Online
A lot of Patience. The process is simple but brute forcing the
PIN takes a lot of time. So you have to be patience. Kicking the
Computer won’t help you this time.
After some time Backtrack will take you into a command line prompt where
you should type startx and press Enter. BackTrack will boot will into
Graphical User Interface (GUI) mode.
Now that you are connected to internet its time to install Reaver. Click the
terminal icon in the menu bar. And at the console type the following:
apt-get update
apt-get install reaver
Now if everything worked fine you will get a freshly installed Reaver ?
tool. Now if you are testing it in your own system then please go to
Wicd Network Manager and Disconnect yourself first.
First lets find your wireless card. Inside terminal or console, type:
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com
airmon-ng
Press Enter and there you should see a list of interface names of
different devices. There should be a wireless device in that list you
you have connected it to BackTrack. Probably it may be wlan0 or
wlan1.
This code will create a new monitor mode interface mon0 like in the
screenshot below which you want to keep note of.
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com
Watch TV Online (FREE)!
Stream over 2,150 Channels. One-Time Setup Fee
Unlimited Access
wash -i mon0
You will see the list of wireless networks that support WPS which
are vulnerable to Reaver as seen in the screenshot below. After few
minutes you can stop the scan by pressing Ctrl+C.
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com
reaver -i monitormode -c channel -b targetbssid -vv
Press Enter and if everything goes right then you will see the attack
process like in the screenshot below. Please note that you will not
get “Restore previous session…” like me because I have already
tried to crack it so, it is prompting me to either to resume from that
paused point or not. Your progress will also be saved if your press
Ctrl+C. It will prompt you the same if you again hit the same above
command and you can resume it from there.
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com
Now just wait or have some coffee and let Reaver do its magic. It
might take from 2 hours to 10 hours or more. There are 8 numeric
digits of WPS but due the fact that WPS authentication protocol
cuts the pin in half and validates each half separately. Since the last
digit of pin is a cheksum value which can be calculated on the basis
of previous value there are 10^4=10,000 possible values for first half
and then 10^3=1000 values for the last pin. So the WPS pin code
can be calculated in 11,000 possible pin code. Some AP can check
the WPS pin in the rate of 1 pin per second and some take more so
the time depend upon the AP and even the network connection
strength depends too.
When the PIN is successfully brute-forced Reaver will show you the
WPS PIN and the plain password of the AP like in the below
screenshot.
Example:
So now the error part as you might get a bunch of error depending
upon your conditions. You might get some timeout but it is normal
but if you are getting other errors then see the below Error section
for that
Error Section:
If you are getting the following error then check the corresponding
solution for that.
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com
reaver -i mon0 -b 00:01:02:03:04:05 -t 3
Reply hello
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com
I am looking for wpa2 password hacking i can’t
this type meth herd
Leave a Reply
Author (required)
Website
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com
Post Comment
open in browser PRO version Are you a developer? Try out the HTML to PDF API pdfcrowd.com