Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Reaver of practical wifi password cracking tools and defense skills

2025-04-05 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

At present, I am exposed to WiFi cracking strategies only PIN guess solution and grasp handbag brute force cracking two kinds, these two kinds of online tutorials are a lot, but I still hope to be able to organize down, by the way, how to defend. Some people even use these methods to make money on a treasure. I don't quite understand why most people's pursuit of technology is limited to free net surfing. Greed is human nature. However, are we acting a little too much? Well, this time we make an exception with pictures.

First of all, you need a good wireless network card, at least only linux support network card, as for linux support which network card, baidu is, very much. Open the virtual machine and type iwconfig if you can see wlan0 indicating that your wireless card is recognized

Of course, this name is not absolute, where lo is 127.0.0.1 eth0 is my wired network card. The next thing to do is turn on the wireless network card listening function

Okay, I think you all saw that. Airmon-ng start wlan0 is to turn on the monitoring function. After successfully turning it on, the name becomes mon0. Some may not be. Of course, this name is very important. It is necessary to remember, because next, you have to check the surrounding wifi.

Sorry, my network card power is relatively large, catch more, ha ha, do not cut, here I think many people see the understanding of BSSID is MAC address, PWR number is related to the signal strength of the value, basically the smaller the better, of course, less than 70 I think there is no problem, CH is the channel, if only use this tool, do not need to consider this problem, because it will automatically seek channels, MB is one of the wireless routing mode. Among them, 54e. I cracked this mode (pay attention to that dot), because if the wireless routers with WPS function are all dotted, this will basically succeed by using reaver. Some tutorials do not specify 54e. I have not tried it.(Personal social security is limited, and do not want to destroy neighbors), but in principle it will not succeed, because reaver this tool theoretically uses WPS to guess PIN break PSK password, and the disadvantage of this method is that the signal requirements are extremely high, need to have a good wireless network card, and close enough distance. If the signal is bad, it may cause deadlock, so I won't say more here.

This is a snippet of help documentation I intercepted for the reaver tool. Obviously it gives standard parameters for processing. We just need to replace MAC with BSSID we want to crack. Of course, if you are serious, you lose, hehe, directly knock this command, basically will crash your target router or shield your malicious pin behavior. However, there are still some powerful routers that can catch your *** for a few minutes. Anyway, I have been blocked except for the crash. There are no other results. So it's a good habit to read the help documentation carefully before using tools, which would not be the case if our tools were set up properly. I'm not gonna post the help file. Depending on the router, some routers will shield malicious PIN behavior, the default is generally 300 seconds shielding, but there are many routers will secretly set to 60 seconds shielding, I encountered once, ha ha, if encountered will automatically shield, 100% can crack, just 300 seconds shielding do not know how many days to crack, the shortcomings of this tool is so obvious, it will take a long time to win. The following command is important:

reaver -i mon0 -b MAC -a -S -vv -d 60 -t 3

Where-t is the feedback time, this default is 5 seconds, it is recommended not to change, if the signal is not particularly strong, -d this must have, if you do not want the target router to crash, I originally cracked that is 60 seconds to prevent PIN, there are 300 seconds, how to see this, what parameters do not add ** once, see the error, if the report can be re-PIN after 60 seconds, that is 60 seconds, 300 seconds is also the case, -a -S can improve the cracking speed, No need to set the value, so OK, you can see. I'm not going to post the next graph here, because when I first saw percentage progress, I was really excited, and I want to keep that excitement for you. Also note that if there is no anti-PIN router, don't be too violent, it's not good to break people to death, so-d should be set a little bit. Besides, this command is very useful.

reaver -i mon0 -b MAC -a -vv -p xxxx If you know the first few digits or know the PIN of this router before, you can crack it with this command. Especially if you break the target router, but after the target router is alert to modify the password, it takes a lot of time to crack it again. Use this parameter command to enter the PIN and soon break the new password.

In addition, there is a high probability that this tool will stop guessing, most of which are due to timeout or something. Just run it again and it will continue to work.

If someone places malicious *** behavior on my router, the answer is to turn off their WPS, QSS features. Not affecting normal use. Another way is to know that you have been scammed, in addition to modifying your password, you also have to re-generate the PIN code, of course, you have to find a book to write down the PIN. In addition, I will talk about the cracking method and defense of handshake and grab bag later. In fact, I think wps web with handshake packet cracking almost can not defend, ha ha, in addition to some routers have a backdoor, I will not tell you, D-link has. Google it yourself.

Finally, give a figure that is being cracked. You can see that it starts from 12345670 to try PIN. This method is normal to crack within 3 days. The disadvantage is slow.

You can see the progress, 0.003%, I will not continue to crack, so far, careful can see that I used kali in the front, I used BT in the back, because kali has some problems with my network card support, fortunately I have linux driver package, another day in the drive, today's demonstration under the calculation

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report