Cracking WPA in 1. Hours or Less devtty. S0. The Wi. Fi Protected Setup protocol is vulnerable to a brute force attack that allows an attacker to recover an access points WPS pin, and subsequently the WPAWPA2 passphrase, in just a matter of hours. This is something that Ive been testing and using for a while now, but Stefan over at. Such is life. Stefans code isnt quite ready for release yet, so Ive open sourced Reaver, my WPS attack tool. Reaver is stable and has been tested against a variety of access points and WPS implementations. Usage is simple just specify the target BSSID and the monitor mode interface to use reaver i mon. For those interested, there is also a commercial version available with more features and speed improvements.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
November 2017
Categories |