A summary of WiFi cracking methods

Source: Internet
Author: User

In this era of the Internet, do not get points to crack WiFi skills can not survive, this article I have for many years to crack the method of WiFi to do a summary, there are simple and difficult to slightly higher.

  First, using WiFi software

At present, there are many WiFi sharing software online, especially the mobile phone side is more popular, such as a key, their solution is to secretly put the user WiFi password uploaded to the server sharing, although more wicked, but really convenient for the public. Using this approach, we use our mobile phone to download a key and then connect it to WiFi via the software. The password will be kept on the phone, and then we'll download a WiFi password viewer. apk This allows you to obtain a WiFi password, provided that the cell phone needs root. The iphone is the same, but it also needs to escape. Of course you do not want to use mobile phone can also, the current key also has a computer version, although the official has not provided download, but find besides is there.

Here said the key, similar software there are many, they are characterized by secretly sharing the user's WiFi password, to achieve a crack purpose, the greater the number of software users to crack the higher probability. Usually I go to a new place to get the WiFi password This is a preferred method. As long as there is no WiFi too few places, usually get more than 60% of the probability.

  Second, run the dictionary

This is the most original and direct way, the premise is that we need to have a strong dictionary, this method is that blind cat can encounter dead mice, as long as the user set the password is not too complex generally speaking, the probability of cracking is pretty high, as long as you have a hot spot near WiFi, crack 1~2 should be no problem. This method has no technical content, how to run is not to elaborate, there are many off-the-shelf software, such as Mirage WiFi. This software is more stupid, look at it again, a higher level can use the virtual machine run, so efficiency will be a little higher.

  Third, running pin

To explain the pin first, simple point is a quick verification method, as long as the router to open the WPS function, we can quickly connect through the PIN code. The PIN code is 8 digits, so it's easy to crack. Someone on the internet said that pin code can be calculated, this is a little too general, is not wrong, but only for tenda part of the route.

Running a pin requires a strong signal network card, a treasure on the sale, but also a Linux system. The system can be engraved on a U disk or run in a virtual machine, I suggest using a virtual machine, so you can do other things. Cracked Linux system, the current more popular is cdlinux and BT system, as for which personal preferences, are Linux platform. I am here to Cdlinux as an example, we mainly use the software is MINIDWEP, the current cdlinux version of a lot, and some of the integration of a lot of crack tools and dictionaries, equivalent to the development version of the Crack tool.

The MINIDWEP procedure is relatively simple, the main is to sweep first in Reaver. You need to fill in the parameters when Reaver, if you do not know how to use the default. If you want to study, you can refer to the following content

-A to automatically detect the target AP optimal configuration

-V Display Information

-s,-n S can be a little slower, but it's effective in preventing leaks.

-X 20 You cannot receive a packet rest for 20 seconds when a pin attempt occurs 10 times

-R 100:10 Rest 10 seconds per PIN100

-I 300 some routes will have pin protection pin error How many times at least 300 seconds before allowing you to continue pin if you encounter those routes that are easily pin dead, it is recommended to change-s to-N, followed by-T 10-d 2

T-10 packet timeout for sending Nack if the number is not followed by the packet timeout 5 seconds

-D 2 wait 2 seconds after each PIN to continue the pin next

If you want to speed faster, there are many online pin and Mac corresponding table, you can go to Google to help us save time, the previous computer has been saved, and then do not know where to go, there will be no PO

Can break the key to success and network card, if you are very willing to crack the words of the need to buy a high-power wireless network card, whether it is used to surf the internet, usually used to hang on the internet is also a kind of enjoyment ah

Methods about three kinds of introduction, there are other methods, such as grasping the bag and so do not say nothing too much significance. Of course to understand these not necessarily to crack, this article more important meaning is to let everyone use when know what to pay attention to. Here I also small sum up the Secure router Setup Method!

1. Turn off SSID broadcast to achieve hidden WiFi

2. Set a more complex password

3. Close WPS function

Generally do this four points on it, of course, in order to prevent the leakage of passwords, we also need to uninstall the phone on the WiFi management software, so as to achieve foolproof.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.