If you mean in wifite, dunno as I rarely touch it.Ĥ.) ensure the target is not in rate limit mode/locked currentlyĥ.) stop wash and copy the bssid and make note of the channelĦ.) plug that info into the reaver fork command (-c is the optional argument for channel) There is that outdated AutoPixieWPS python script I linked earlier I believe that does it (like I said a few lines in the script need a tweak due to the reaver fork command changing). Now, there ARE some problems with going to the new aircrack suite and the new Reaver fork, mostly due to the changed syntax from "mon0" to "wlan0mon", but it's a small price to pay. NOTE: Not all models of wifi routers are vulnerable, so you'll see quite a few "WPS Pin not found" Pin not found, trying -f (full PRNG brute force), this may take around 30 minutes Sudo reaver -i wlan0mon -b xx:xx:xx:xx:xx:xx -c (PUT CHANNEL HERE) -vvv -K 1 -f Here is a sample Pixie Dust syntax, just put in the BSSID in place of the xx's and add a channel number: Install all needed dependencies first for Kali 1.1.0 I needed to add:ĭoes your Kali open a monitor as mon0 instead of wlan0mon? If so, you have the OLD version ofĪircrack-ng, which works great for FrankenScript, but for this you'll want the new aircrack suite: I installed the new Reaver fork, which overwrote the old version. I am new to Kali and out of the box the Pixie Dust attack did
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |