From the course: Ethical Hacking: Wireless Networks

Unlock the full course today

Join today to access over 25,200 courses taught by industry experts.

Extracting network passwords through WPS

Extracting network passwords through WPS - Linux Tutorial

From the course: Ethical Hacking: Wireless Networks

Extracting network passwords through WPS

- WPS can be attacked using a brute force attack on the PIN, which has only about 11 thousand valid combinations. One of the popular tools for testing WPS is Reaver. So let's have a look at that. I'll be running this against my Technicolor TG582N home router. I have a terminal window open, so I'll set my wireless adapter to monitoring mode and run a tool called Wash, to identify candidate WPS enabled networks, so that I can see the BSSID, which I need for Reaver. My router is called Telecom05 and I can see the BSSID is 9c 97 26 55 D1 DF. It's operating on channel one, which Reaver also needs to know. I'll now run Reaver to do a WPS attack. We can see Reaver trying to connect to WPS using the keys it's generating. It quickly identifies the type of device and extracts its manufacturer, Technicolor; It's model, Technicolor TG; its model number 582n, and its serial number. We can also see Reaver managing the M1 and M2…

Contents