UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
🦑 Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

Web & Services:
Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Tool: Reaver - WPS PIN Brute-Forcing Tool

Reaver is a powerful tool designed to exploit vulnerabilities in Wi-Fi Protected Setup (WPS) to recover the PIN used for authentication in wireless routers. It allows attackers to brute-force the WPS PIN and gain access to the target network.

---

### Basic Usage Command:
reaver -i wlan0 -b XX:XX:XX:XX:XX:XX -vv


Explanation:
- reaver: Runs the Reaver tool.
- -i wlan0: Specifies the wireless network interface to use (replace wlan0 with your network interface name).
- -b XX:XX:XX:XX:XX:XX: Specifies the target router's BSSID (MAC address).
- -vv: Enables verbose output to display more information during the attack.

---

### Example: Specify a WPS PIN to Brute-Force
reaver -i wlan0 -b XX:XX:XX:XX:XX:XX -p 12345670 -vv


Explanation:
- -p 12345670: Attempts a specific WPS PIN, instead of brute-forcing the entire PIN.
- -vv: Provides detailed output for monitoring progress.

---

### Example: Save Results to a File
reaver -i wlan0 -b XX:XX:XX:XX:XX:XX -vv -o /path/to/output.txt


Explanation:
- -o /path/to/output.txt: Saves the output to a specified file for later analysis.

---

### Important Notes:
1. Reaver works only on routers with WPS enabled, and the attack may take several hours to complete depending on the router's implementation of WPS.
2. Legal Considerations: Always ensure that you have explicit permission to perform wireless network penetration testing on the target system. Unauthorized use of Reaver is illegal.
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Tool: Airgeddon - Wireless Security Auditing Tool

Airgeddon is a multi-use wireless security auditing tool that can be used to perform a variety of attacks on Wi-Fi networks, including WPA/WPA2 handshake capture, deauthentication attacks, and more. It is often used for auditing the security of wireless networks and cracking WPA/WPA2 passwords.

---

### Basic Usage Command:
airgeddon


Explanation:
- airgeddon: Runs the Airgeddon tool (the tool will prompt you for additional options such as selecting the wireless interface).

---

### Example: Capture WPA Handshake
1. Start the tool and select your network interface.
2. Choose to perform a WPA handshake capture.
airgeddon -i wlan0 --capture-handshake


Explanation:
- -i wlan0: Specifies the wireless network interface.
- --capture-handshake: Captures the WPA/WPA2 handshake, required for password cracking.

---

### Example: Deauthenticate Clients
airgeddon -i wlan0 --deauth


Explanation:
- -i wlan0: Specifies the wireless network interface.
- --deauth: Sends deauthentication packets to clients connected to a target network, forcing them to reconnect and allowing for handshake capture.

---

### Example: Crack WPA2 Password (using captured handshake)
Once the handshake is captured, you can use Airgeddon to start a dictionary attack:
airgeddon -i wlan0 --crack-wpa /path/to/wordlist.txt


Explanation:
- -i wlan0: Specifies the wireless network interface.
- --crack-wpa: Starts a brute-force attack to crack the WPA2 password using a provided wordlist.

---

### Important Notes:
1. Airgeddon is best used for wireless network penetration testing and is highly effective for auditing WPA2 networks.
2. Make sure you have permission before using this tool on any wireless network to avoid legal issues.
3. A strong wordlist is crucial for the success of WPA password cracking. Ensure your dictionary contains possible passwords for the target network.