Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Practice of BT5 cracking WPA2-PSK Wireless password

2025-04-04 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

There is a wireless signal near where I live, and I think I can try to crack it, so I have the following practice.

Software and hardware environment: Vmware Workstation 9, BT5, r3, reaver 1.4, wireless network card LINKSYS WUSB54GC

Under BT5, make the following command: ifconfig-a find the wireless network card

Ifconfig wlan0 up activates wireless network card

Airmon-ng start wlan0 sets the wireless network card mode to monitoring

Mon0 appears in ifconfig-a

The following is to view the wireless network information, that is, grab the packet: airodump-ng mon0, see the following figure

The author tries to use aireplay-ng to Deauth*** mon0 to get handshake package, which is successful, but the use of password dictionary for brute force attack is not successful, bad luck, password setting is a little complicated. Therefore, the practice of cracking pin with reaver is changed. There is a limitation in using PIN method to crack WPA-PSK password, that is, AP must enable QSS and WPS functions. In the picture above, listed below by MB, there are'.' Indicates that QSS or WPS is turned on. PWR should be greater than-75.

The reaver command is simple. To crack kay' 's network, enter the command: reaver-I mon0-b F4:EC:38:48:9F:BE-v, as shown in the figure below.

A duplicate time out appears in the middle. Because reaver can automatically save the progress, it is decisively interrupted, and then try again, as shown in the following figure:

The-vv parameter can display more information, or you can add the-S parameter. Finally, it is successfully cracked, as shown in the following figure:

It takes four hours.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report