You can use various other Linux distribution but I prefer Backtrack. Backtrack is a bootable Linux distribution with lots of pen-testing tools. There are various ways to set up Reaver, but here are the requirements for this guide. The brute force may take from 2 hours to more than 10 hours. You may need a fair bit of time for this process and maybe also some luck. The simple command-line (console ) will do it all. You do not have to be a expert at Linux or at using a computer. ![]() NOTE: This tutorial is for Educational Purposes Only! In simple terms, Reaver tries to bruteforce the pin which will reveal the WPA or WPA2 password after enough time. Thanks to Craig Heffner for releasing an open-source version of this tool named Reaver that exploits the vulnerability. ![]() Reaver takes the advantage of a vulnerability in WPS. WPS exists in most routers for easy setup process through the WPS pin, which is hard-coded into the wireless access point. WPS is an optional device configuration protocol for wireless access points which makes it really easy to connect. The targeted router should support WPS (WiFi Protected Setup) which is supported by most routers nowadays. Today I am going to teach you how to easily hack WPA/WPA2-PSK enabled networks using Reaver.
0 Comments
Leave a Reply. |