
Let’s capture the handshake with Airodump-ng and Aireplay-ng and start Airodump-ng to find our target with the following command: This wordlist will hack a TP link WR841N router wireless network with 100% certainty. This may take a little while, the result is a 900 MB wordlist containing all possible combinations of 8 digits. Let’s start Crunch with the following command:Ĭrunch 8 8 1234567890 -o /root/Desktop/88numlist.txt
airplay-ng to force de-auth connected clients. Airodump-ng to capture the 4-way handshake. Let’s see if we can get the password by capturing a 4-way handshake and an offline bruteforce attack with a default router password list. Start Reaver with 5 seconds delay and imitating a win7 PC: Let’s try to hack this router using Reaver. This router is not vulnerable to Pixie Dust WPS Attack. –PKR is the Public Key of the Registrar (used to verify the legitimacy of a WPS exchange and prevent replays.) –PKE is the Public Key of the Enrollee (used to verify the legitimacy of a WPS exchange and prevent replays.) We just do 10,000 because it makes no time difference and it’s just easier.) –PSK2 is the second half of the router’s PIN (1,000 or 10,000 possibilities depending if we want to compute the checksum. –PSK1 is the first half of the router’s PIN (10,000 possibilities) –HMAC is a function that hashes all the data in parenthesis. –E-Hash2 is a hash in which we brute force the second half of the PIN. –E-Hash1 is a hash in which we brute force the first half of the PIN. Now start pixiewps with the following arguments: We need the PKE, PKR, e-hash 1&2, E/R-nonce and the authkey from Reaver to use for pixiewps. Now pick your target and use the BSSID and the channel for Reaver: Start airodump-ng to get the BSSID, MAC address and channel of our target. iwconfig check if the mode is monitoring mode now.
Use iwconfig to check if the interface MODE is in managed mode, if so then change it to monitor instead of managed with the following commands:. A monitoring interface will be started on wlan0mon. Put the device in Monitor mode Airmon-ng start wlan0. Step 5 – If you satisfied with this bypass binatone wifi password trick/hack – Just Like & Share my Facebook Page. Step 4 – After this at the Box “Name” you will have to fill the – “binatone_1” & in “Security” box you will have to select the “WEP”, Then in the “Password” box you will have to type the password – 0987654321 . Step 3 – Then “Other” or “add network” appears on your screen and tap them. Step 2 – Select the “Wifi” option in the menu. Step 1 – Go to the “Settings” menu in your iphone/android. There are few Steps you will have to follow :.