Simple access to wi-fi passwords

Source: Internet
Author: User

I tried to crack WiFi recently. I wrote a tutorial for this. It is easy to understand and easy to use. Click scan. Wait a moment and the nearby WiFi hotspots will be listed. because it is a residential area, houses are relatively intensive, so many signals can be found. describe how to use this method.[Start] The button is in Packet Capture Mode: When a wireless device is connected to the vro, the generated data is obtained.[Reaver]The button is in Pin mode: The target router is configured with a Pin (if WPS is enabled on the router) until the Correct Pin code appears, to quickly obtain the psk key of the vro, that is, the Wi-Fi password. To better crack the password, you must first understand the advantages and disadvantages of the two methods so that you can better, it takes less time to crack the password * exhaustive Pin code mode: If the encryption method is followed by wps, you can use the Pin code. click Start to start Pin.>.Prompt:Pin code is luck and patience.If you are lucky, the Pin code starting with "1" will soon be able to crack the password. If it starts with "9", wait patiently. there are many people in the Pin for two or three days, so you must be patient. If you can Pin the Pin, you must have a password. No matter how the user changes the password, as long as you do not change the Pin, you can use the Pin to get the Wi-Fi password.Advantages: As long as the Pin can be connected, the password can be obtained without the need to connect the client to the vro. wps is enabled for most vrouters by default.Disadvantages: It takes a long time. According to the number starting with the Pin code, it is also possible to run a two-to-three-day program by luck, and the router Pin is easy to die. * packet capture mode: When packet capture is enabled, it is the best time to capture packets if the peer router has a device connection. after the AP encryption method is followed by the Mac address, you can use packet capture. because there is a client connection. (For example, if a packet has been captured, you can run it with the password provided by the software. If you are lucky, you can run it, I usually send the password to the AnyWlan forum for the powerful dictionary-based shoes)>. tip: If you want to run your own password, you need to download EWSA and bring your own dictionary ~ Intercept the password of the router that ran out.Advantages: When the target router does not have the QSS function or is disabled, it is easier to catch packets than the Pin mode, and the lucky password is quickly broken out.Disadvantages: The vro has no device connection for a long time; it is difficult to run out of the package, the password is too strong, and the dictionary cannot run. * The Pin code of the router that can be calculated from a certain Mac address of tengda is suitable for wireless routers whose first six digits are "C83A35/00B00C". To ensure the authenticity of the Pin, it is best to use Inflator (commonly known: for verification, the PSK password is run by the way. Generally, the first five digits calculated by the input will be handed over to the pump, so that the password can be better guaranteed. with the Pin code, you can directly connect with the 8187 software. The NIC driver has been packaged.00x04 SummaryFor your reference. for the radar antenna that comes with the card Emperor (targeted antenna, I am no longer capable of spitting out the slot, the shape is not feeling, and the radiation should not be small, every time I plug in, in a short time, my head will be dizzy. Obviously, it is estimated that the 18db in the box is not that high. however, all sorts of disgusting feelings force the brain. so I changed the radar-targeted antenna to a 6db omnidirectional antenna, which instantly made me feel disgusting. Then I tested the effect and felt pretty good. the subsequent cracking work will be handled by this omnidirectional antenna .) I suggest you try an omnidirectional antenna instead of a 40 cm 9 dB omnidirectional antenna. I cannot guarantee the effect of the attack. There are many factors that affect the attack. if the attack is successful,It is hoped that the civilized network will not be able to download movies during normal time, or take up a large amount of bandwidth resources.First, it is a kind of specification for their own behavior. Second, when the other party finds that the network speed is slow, it will change the password or use more powerful means to defend against it. That is not worth the candle. (If you really need to download it, try to arrange it after, and it will be quiet at night ...) the original Article has been written for a long time.Omissions, Please leave a message to indicate;If you have any questions, leave a message to ask.. I will answer in detail ~

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.