Jump to content
co4ie

Reaver brute force attack Tool, Cracking WPA in 10 Hours

Recommended Posts

The WiFi Protected Setup protocol is vulnerable to a brute force attack that allows an attacker to recover an access point’s WPS pin, and subsequently the WPA/WPA2 passphrase, in just a matter of hours.

blog1.jpg

Reaver is a WPA attack tool developed by Tactical Network Solutions that exploits a protocol design flaw in WiFi Protected Setup (WPS). This vulnerability exposes a side-channel attack against Wi-Fi Protected Access (WPA) versions 1 and 2 allowing the extraction of the Pre-Shared Key (PSK) used to secure the network. With a well-chosen PSK, the WPA and WPA2 security protocols are assumed to be secure by a majority of the 802.11 security community.

Usage is simple just specify the target BSSID and the monitor mode interface to use:


# reaver -i mon0 -b 00:01:02:03:04:05

Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a wide variety of access points and WPS implementations.On average Reaver will recover the target AP's plain text WPA/WPA2 passphrase in 4-10 hours, depending on the AP. In practice, it will generally take half this time to guess the correct WPS pin and recover the passphrase.

WPS allows users to enter an 8 digit PIN to connect to a secured network without having to enter a passphrase. When a user supplies the correct PIN the access point essentially gives the user the WPA/WPA2 PSK that is needed to connect to the network. Reaver will determine an access point's PIN and then extract the PSK and give it to the attacker.

Get open source version of Reaver at Google Code

Sursa

Voi face un video cu POC al acestei metode ... sper sa fie ceea ce asteptam toti !!

Edited by co4ie
Link to comment
Share on other sites

Dupa cele spuse, pare valid doar daca Access Point-ul suporta metoda pentru PIN. Teoretic, in schimb, la un asemenea bruteforce (online), se genereaza mult trafic avand in vedere ca trebuie sa verifice daca acel PIN este corect si apoi sa il incerce pe urmatorul daca nu, verificand daca i s-a dat PSK-ul sau nu.

Astept PoC-ul tau co4ie, iar daca se poate, pune si un listener (wireshark w/e) sa se vada in dump cat trafic este generat catre AP si daca reaver foloseste verificare la fiecare PIN incercat online, sau daca reuseste prin vreo metoda sa faca offline.

Daca am gresit cu ceva (sunt doar teorii nu am testat ce am scris), corectati-ma.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...