First public release.
•v0.0.2
Bugfixes, added support for WEP keys.
•v0.0.3
Added support for 802.1x networks.
•v0.0.4
Added more key file locations.
•v0.0.5
Stability fixes, speed increase, UI refresh.
•v0.0.6
Removed the QRCode Encode option. Sorry, it slipped in from my development tree. I will re-add it (fully working) in the next version.
•v0.0.7
Code cleanup, re-added QRCode display.
•v0.0.8
UI Update, rewrote some of the internals.
Follow these simple steps.
1) Open terminal and type
and then type your password.
2) Download Reaver (Better Download the Latest Version ) Place in a specified folder.
3) Open the Terminal and type
4) Install dependencies
then
Note: libpcap and libsqlite3 maybe included in your Ubuntu version but they are very important.
5) Enter the folder by typing
6) Type
7) Type
8) Type
Note: To test if Reaver have been successfully installed, Open a Terminal and Type ‘reaver’ and hit enter, it should list all Reaver’s sub commands.
After installing reaver 1.4, it’s time to proceed to the main part which is hacking wireless passwords that uses WPA/WPA2 Encryption.
Requirements:
Install aircrack-ng by typing
Airodump-ng / Airmon-ng commands
Reaver 1.4 (Install in Step 1)
1) We need to have the wireless BSSID (Mac address) so we use airodump-ng. Open a terminal and Type :
Type
It will lists the available wireless passwords, now copy the BSSID of the Access Point ( e.g : 00:11:28:32:49:55 )
2) Starting the attack type:
Now it will start testing bruteforcing the PIN number of the vulnerability WPS (which we have spoke about it), and it will show you the WPA/WPA2 Password in the end of the Crack.
Note: You can use walsh -i mon0 to scan for vulnerable Access Points.