From the course: Ethical Hacking: Wireless Networks

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Extracting network passwords through WPS

Extracting network passwords through WPS - Linux Tutorial

From the course: Ethical Hacking: Wireless Networks

Start my 1-month free trial

Extracting network passwords through WPS

- WPS can be attacked using a brute force attack on the PIN, which has only about 11 thousand valid combinations. One of the popular tools for testing WPS is Reaver. So let's have a look at that. I'll be running this against my Technicolor TG582N home router. I have a terminal window open, so I'll set my wireless adapter to monitoring mode and run a tool called Wash, to identify candidate WPS enabled networks, so that I can see the BSSID, which I need for Reaver. My router is called Telecom05 and I can see the BSSID is 9c 97 26 55 D1 DF. It's operating on channel one, which Reaver also needs to know. I'll now run Reaver to do a WPS attack. We can see Reaver trying to connect to WPS using the keys it's generating. It quickly identifies the type of device and extracts its manufacturer, Technicolor; It's model, Technicolor TG; its model number 582n, and its serial number. We can also see Reaver managing the M1 and M2…

Contents