SecPoint - Best IT Security
The best Innovative and powerful IT Security products

Resources / IT Security Resources Part3 /

Wi-Fi WPA, WPA2 & WPS Encryption Cracking Guide

How do attackers break in to the Wifi access points.
Some of the newer vulnerabilities in WPS Wifi Protected Setup shows that many routers are fundamental vulnerable.

The WPS Allows attackers to brute force

The WPS functionality that is enabled from the factory in most routers from TP-Link, Dlink, Zyxel, Huawei, Linksys and others.

Due to the poor design there is no limiting connection attempts.

The vulnerability allows hackers to guess the code no matter the length in just about 20.000 attempts. Where before the vulnerability it would have taken 100.000.000 attempts.

This means it is possible in just a couple of hours by the hackers

First of all, you must start the wi-fi scan and connect an 8 dBi antenna for the best range possible.

  1. Once it starts Wi-Fi Auditing networks, you will see several WEP WPA & WPA2 networks on the target listing. It is a must for you to look see the wifi signal power of the access point that you want to target. It is adviced for you to have at minimum 15 in signal strength power or higher to successfully sniff the handshake and crack your targeted WPA or WPA2 network.
  1. Cracking a WPA or WPA2 network is different from cracking WEP—which means it will not just crack in a matter of minutes. Instead, you need to capture a connection handshake from a valid user that connects to the WPA or WPA2 network and then Brute force his connection with authority. The Portable Penetrator will assist you with this by providing 300% enforced speed and overly large dictionaries in many languages.
  1. There are two ways to get the handshake if there are users connected. The handshake gets captured whenever someone connects to the wi-fi network.
  1. If no users are connected you must be patient and wait for someone to connect and capture the WPA or WPA2 handshake that can be cracked. Otherwise, you won't be able to crack the encryption.
  1. If there is one or several users connected to the WPA or WPA2, simply select the network and target one of the users. From there, create a quick DOS attack at one of the connected users to force that user to disconnect and reconnect. Through this method, you'll capture the handshake. Usually, the user will not even notice anything when you do the attack.
  1. When you have the handshake, the cracking will begin with the selected dictionaries. A good crack will run with 1,300 keys a second, which is equivalent to millions of cracks within a few hours.
  1. If the password was not found in the dictionary you selected, you can select another dictionary File. It is highly recommended to select your language files dictionary or choosing a hefty 1 gigabyte+ dictionary files for better cracking availability performance.

For support please contact your support team that can help with more instructions for the password recovery.

With Portable Penetrator Wifi Pen Testing Software you can do an audit scan on your WiFi encrypted networks for WPA/WPA2, WPS, WEP weakness.

Learn to secure your wifi before it gets hacked by wardriving black hat hackers.



➤ Related pages
Anti-Cracking Tips & Tricks
Anti-Cross Site Scripting (XSS)
Block Email Junk
Choose Vulnerability Scanning?
Email & Spam Test Links
How to Get Rid of a Trojan Horse
Internet Information Services (IIS)
IT Security Gurus
Pen Test Appliance
Server Misconfiguration
SharePoint Multi-Tier Attacks
Spam Blocker
SQL Server Stored Attacks
Stop Spam
Technology Papers
Test Your Security Policy
Top 10 Cloud Computing Services
Wifi WEP Encryption Cracking Guide
Wifi WPA & WPA2 Guide
Worldwide Security Events

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef