Crack WPS with Reaver


Many routers and IoT de­vices sup­port WPS, which is sup­pos­edly a quick and easy way to con­nect to de­vices. In prac­tice it’s a se­cu­rity night­mare be­cause con­nec­tions are only se­cured by an eight-digit PIN. And the de­fault PINS for cer­tain de­vices can be found on­line!

If at all pos­si­ble, try to per­suade the net­work owner to dis­able WPS al­to­gether. If this isn’t pos­si­ble (some routers don’t sup­port dis­abling WPS) you can at least see how easy they are to brute­force us­ing Reaver. Open the ter­mi­nal in Kali and run apt-get

install reaver to get started. If you haven’t done so al­ready place your wire­less card into mon­i­tor­ing mode with air­mon-ng start <in­ter­face> . Next run wash -i <in­ter­face> to view all de­vices in range which sup­port WPS. Next, run the com­mand reaver -i <in­ter­face> -b <bssid> -c <chan­nel> -vv , for ex­am­ple, reaver -i wlan1­mon -b 00:19:70:70:15:2C -c 6 -vv to be­gin crack­ing the PIN. Pro­vided the de­vice doesn’t limit the num­ber of at­tempts, it should take no more than 24 hours to ac­cess a de­vice in this way by sim­ply try­ing ev­ery com­bi­na­tion. You can use Ctrl+C to stop the process, then re­sume from where you left off if you wish.

Reaver will at­tempt to brute­force the PIN for clients us­ing WPS. Typ­i­cally, this takes around 10 hours.

Newspapers in English

Newspapers from Australia

© PressReader. All rights reserved.