From the course: Ethical Hacking: Wireless Networks
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Extracting network passwords through WPS - Linux Tutorial
From the course: Ethical Hacking: Wireless Networks
Extracting network passwords through WPS
- WPS can be attacked using a brute force attack on the PIN, which has only about 11 thousand valid combinations. One of the popular tools for testing WPS is Reaver. So let's have a look at that. I'll be running this against my Technicolor TG582N home router. I have a terminal window open, so I'll set my wireless adapter to monitoring mode and run a tool called Wash, to identify candidate WPS enabled networks, so that I can see the BSSID, which I need for Reaver. My router is called Telecom05 and I can see the BSSID is 9c 97 26 55 D1 DF. It's operating on channel one, which Reaver also needs to know. I'll now run Reaver to do a WPS attack. We can see Reaver trying to connect to WPS using the keys it's generating. It quickly identifies the type of device and extracts its manufacturer, Technicolor; It's model, Technicolor TG; its model number 582n, and its serial number. We can also see Reaver managing the M1 and M2…
Contents
-
-
-
Understanding wireless networks5m 52s
-
(Locked)
Selecting an antenna for wireless network testing5m 16s
-
(Locked)
Configuring security in wireless networks3m 26s
-
(Locked)
Understanding the Wi-Fi Protected Setup (WPS)5m 20s
-
(Locked)
Extracting WEP passwords using Wifite2m 9s
-
(Locked)
Extracting network passwords through WPS2m 35s
-
(Locked)
Using WiFite and Aircrack-ng to test WPA passwords2m
-
(Locked)
Using Pixiedust to recover keys2m 44s
-
(Locked)
A first look at WPA32m 26s
-
(Locked)
Understanding Dragonblood2m 37s
-
-
-
-
-
-