LaDissertation.com - Dissertations, fiches de lectures, exemples du BAC
Recherche

Réseau WPA / WPA2-PSK

Commentaire d'oeuvre : Réseau WPA / WPA2-PSK. Recherche parmi 300 000+ dissertations

Par   •  10 Novembre 2014  •  Commentaire d'oeuvre  •  338 Mots (2 Pages)  •  589 Vues

Page 1 sur 2

Reminder

Today I am going to teach you how to easily hack WPA/WPA2-PSK enabled network using reaver. But, for that the targeted router should support WPS(WiFi Protected Setup) which is supported by most of the router nowadays.

What You’ll Need

You do not have to be a expert at Linux or in even using computer. The simple command-line (console ) will do all the things. But you may need a lot of time for this process and also some luck.

- Backtrack OS

You can use various other Linux distribution but I prefer backtrack. 

- A computer and wireless network card

- A lot of Patience

The process is simple but brute forcing the PIN takes a lot of time. So you have to be patience. Kicking the Computer won’t help you this time.

Let’s Get Started

Now you should have a backtrack OS ready for action.

Gather Information

You need to know your target wireless network name, BSSID and its channel number. So to know this make your wireless card into monitor mode and gather the required information of the access points. So let us do all these things.

First lets find your wireless card

You should see a list of interface names of different devices.

Enable monitor mode

This code will create a new monitor mode interface mon0 like in the screenshot below which you want to keep note of.

Search the BSSID of the Access Point(router) you want to crack

You will see the list of wireless networks that support WPS which are vulnerable to Reaver as seen in the screenshot below. After few minutes you can stop the scan by pressing Ctrl+C.

Lets start Cracking

For that, copy the BSSID of the target AP and also keep note of its channel and in the console and type the following and Enter

Press Enter and if everything goes right then you will see the attack process like in the screenshot below.

Now just wait or have some coffee and let Reaver do its magic.

When the PIN is successfully brute-forced Reaver will show you the WPS PIN and the plain password of the AP like in the below screenshot.

...

Télécharger au format  txt (2 Kb)   pdf (51.1 Kb)   docx (8.7 Kb)  
Voir 1 page de plus »
Uniquement disponible sur LaDissertation.com