"Lying in a featherbed will bring you no fame, nor staying beneath the quilt, and he who uses up his life without achieving fame leaves no more vestige of himself on Earth than smoke in the air or foam upon the water." -Dante Alighieri
Cracking WPA/WPA2 By brute forcing Wi-fi Protected Setup
For legal purposes, please donít try this on any equipment that you donít own.
Wi-fi Protected Setup more commonly known as WPS is an optional configuration tool introduced in many Small office and Home Office (SOHO) Wireless routers starting in early 2007. This Wi-Fi alliance certification program was designed to ease the task of SOHO wireless configuration by providing an industry wide network setup solution. Now a day most major vendors of the SOHO class of Wi-Fi routers ship there product with WPS support and is activated by default.
Today we will be taking a look at 2 flaws in the WPS design that can be exploited in order to brute force the WPS PIN. I will do a brief overview of these 2 flaws then follow up by providing instruction on how to work through exploiting WPS on a SOHO router using Backtrack 5 R3 and a tool called Reaver.
The flaws we will be looking at have to do with WPSís support for in-band configuration over IEEE 802.11/EAP specifically with the External registrar process. This is the process used by a WLAN host to associate with a WAP by using the devices WPS PIN. That being said the first flaw with this external registrar option is that it does not require any authentication from the WLAN host to associate with the WAP leaving the PIN vulnerable to Brute force type attacks.
The second Flaw has to do with the way the WPS authentication process is implemented with 802.11/EAP. This process uses a challenge response methodology and if at any point in the process you fail to correctly respond to the challenge you receive a EAP-NACK Message. This process also splits the key into 2 parts as shown below
1st half| 2nd half &
of PIN | Checksum
So by knowing what at what step we are in the process when we receive the EAP-NACK we reduce the number of possibilities from 10^8 down to 10^4 +10^4 or 100,000,000 to 20,000 but since we know the 8th digit is a checksum of the pin we are really looking at 10^4 + 10^3 or 11,000 total testable combinations to solve for the completed WPS PIN. So with a tool like reaver testing 4 Pinís every 3 seconds we can get through all possible combinations in approximately 4 hours.
Using Reaver with Backtrack 5 R3
What you will need: A copy of Backtrack 5, and an external WLAN adapter ( I use the Alfa networks AWUS036H ) You will also need to know the BSSID (MAC Address ) of the Router you plan to attack. for this you can use something like airodump-ng to analyze all the APís in the area.
So lets get to the fun stuff.
1. Load up your Backtrack 5 instance
2. Open up terminal and run the following commands
a. CODE :
Sudo apt-get update
b. CODE :
Sudo apt-get install reaver
3. Make sure your Wi-fi adapter is connected and then place it into monitor mode
a. CODE :
Airmon-ng start wlan0
4. Next run the following command to invoke reaver
a. CODE :
Reaver ĖI mon0 Ėb <BSSID of target> -VV
Note: you can use CTRL+C to pause and save the attack progress to continue at a later time
Now sit back relax and in a few hours you will have the WPS PIN and the WPA Pre-shared key.
Happy hacking :)
Cast your vote on this article 10 - Highest, 1 - Lowest
Comments: Published: 12 comments.
HackThisSite is is the collective work of the HackThisSite staff, licensed under a CC BY-NC license.
We ask that you inform us upon sharing or distributing.