How To Crack A Wi
How To Crack A Wi
it will remain installed until you reboot your computer. At this point, go ahead and
disconnect from the network by opening Wicd Network Manager again and clicking
Disconnect. (You may not strictly need to do this. I did just because it felt like I was
somehow cheating if I were already connected to a network.)
Step 3: Gather Your Device Information, Prep Your Crackin'
In order to use Reaver, you need to get your wireless card's interface name, the BSSID
of the router you're attempting to crack (the BSSID is a unique series of letters and
numbers that identifies a router), and you need to make sure your wireless card is in
monitor mode. So let's do all that.
Find your wireless card: Inside Terminal, type:
iwconfig
This command will output the name of monitor mode interface, which you'll also want
to make note of. Most likely, it'll be mon0, like in the screenshot below. Make note of
that.
Find the BSSID of the router you want to crack: Lastly, you need to get the unique
identifier of the router you're attempting to crack so that you can point Reaver in the
right direction. To do this, execute the following command:
airodump-ng wlan0
(Note: If airodump-ng wlan0 doesn't work for you, you may want to try the monitor
interface insteade.g., airodump-ng mon0.)
You'll see a list of the wireless networks in rangeit'll look something like the
screenshot below:
When you see the network you want, press Ctrl+C to stop the list from refreshing, then
copy that network's BSSID (it's the series of letters, numbers, and colons on the far left).
The network should have WPA or WPA2 listed under the ENC column. (If it's WEP,
use our previous guide to cracking WEP passwords.)
Now, with the BSSID and monitor interface name in hand, you've got everything you
need to start up Reaver.
Step 4: Crack a Network's WPA Password with Reaver
Now execute the following command in the Terminal, replacing bssid and
moninterface with the BSSID and monitor interface and you copied down above:
reaver -i moninterface -b bssid -vv
For example, if your monitor interface was mon0 like mine, and your BSSID was
8D:AE:9D:65:1F:B2 (a BSSID I just made up), your command would look like:
reaver -i mon0 -b 8D:AE:9D:65:1F:B2 -vv
Press Enter, sit back, and let Reaver work its disturbing magic. Reaver will now try a
series of PINs on the router in a brute force attack, one after another. This will take a
while. In my successful test, Reaver took 2 hours and 30 minutes to crack the network
and deliver me with the correct password. As mentioned above, the Reaver
documentation says it can take between 4 and 10 hours, so it could take more or less
time than I experienced, depending. When Reaver's cracking has completed, it'll look
like this:
A few important factors to consider: Reaver worked exactly as advertised in my test,
but it won't necessarily work on all routers (see more below). Also, the router you're
cracking needs to have a relatively strong signal, so if you're hardly in range of a router,
you'll likely experience problems, and Reaver may not work. Throughout the process,
Reaver would sometimes experience a timeout, sometimes get locked in a loop trying
the same PIN repeatedly, and so on. I just let it keep on running, and kept it close to the
router, and eventually it worked its way through.
Also of note, you can also pause your progress at any time by pressing Ctrl+C while
Reaver is running. This will quit the process, but Reaver will save any progress so that
next time you run the command, you can pick up where you left off-as long as you don't
shut down your computer (which, if you're running off a live DVD, will reset
everything).
setup process, and it's tied to a PIN that's hard-coded into the device. Reaver exploits a
flaw in these PINs; the result is that, with enough time, it can reveal your WPA or
WPA2 password.
Read more details about the vulnerability at Sean Gallagher's excellent post on Ars
Technica.
Este software lo puedes conseguir en google code en la URL http://code.google.com/p/reaverwps/ de donde pueden descargar la ltima versin de este programa. Antes de compilarlo en
Ubuntu o Debian deben asegurarse de tener unos paquetes, por lo que sera bueno que
ejecutaran el siguiente comando:
Bueno una vez que tienes estos paquetes instalados entonces procedes a descomprimir el
tar.gz y a compilar el paquete, eso se hace con los siguientes pasos:
lo
vas
root@localhost:~#
instalar
en
Backtrack
apt-get
&& cd
R1
install
solo
reaver-1.3/src
./configure
make
debes
hacer
reaver
Listo ya con esto lo tienes instalado ahora toca aprender a usarlo, por lo que vamos a ver como
lo use en un Backtrack 5 R1. Lo primero es colocar la tarjeta inalmbrica en modo monitor, lo
que
se
hace
con
el
comando
airmon-ng,
de
la
siguiente
manera:
Despus de esto usas el comando airodump-ng, que te permite visualizar todas las redes
inalmbricas que capta tu antena y conocer su identificador BSSID, con el cual el reaver podr
iniciar la explotacin de la posible vulnerabilidad. Al ejecutar este comando vers algo como lo
siguiente y debes tomar una de los BSSID y con un poco de suerte ese estar configurado
usando
WPS.
Bueno una vez hayas escogido la red entonces ejecutas el comando reaver con la siguiente
estructura
Pero tiene algo muy bueno y es que puedes detenerlo y cuando lo enves de nuevo arrancar
desde lo detuviste , as:
Espero que no lo usen para males, es con el animo de educar no de dar herramientas de
ataques o violacin a la privacidad de las personas. Recuerda que el HACKER es aquel que usa
su conocimiento para ayudar y para mejorar las herramientas y montajes de los dems, el
CRACKER es que usa su conocimiento para beneficio propio y hacer mal a su prjimo, decide
de que lado deseas estar.