Difference between revisions of "Reaver: Hint dan Tip"
Onnowpurbo (talk | contribs) |
Onnowpurbo (talk | contribs) |
||
Line 23: | Line 23: | ||
==Mempercepat serangan== | ==Mempercepat serangan== | ||
− | Secara default, Reaver ada 1 second delay antara pin attempts. Kita dapat | + | Secara default, Reaver ada 1 second delay antara pin attempts. Kita dapat men-disable dengan menambahkan '-d 0' tapi beberapa AP mungkin tidak akan suka ini: |
− | + | reaver -i mon0 -b 00:01:02:03:04:05 -vv -d 0 | |
− | + | Pilihan lain untuk bisa mempercepat serangan dengan --dh-small. Pilihan ini memerintahkan Reaver untuk menggunakan angka diffie-hellman secret yang kecil untuk mengecilkan beban komputasi di target AP: | |
− | + | reaver -i mon0 -b 00:01:02:03:04:05 -vv --dh-small | |
==MAC Spoofing== | ==MAC Spoofing== |
Revision as of 08:17, 12 December 2015
Sumber: http://code.google.com/p/reaver-wps/wiki/HintsAndTips
Syarat
- Harus menggunakan Linux
- Harus menggunakan wireless card yang mampu melakukan raw injection.
- Harus bisa membuat wireless card anda menggunakan mode monitor.
Penggunaan
Set wireless card agar masuk ke mode monitor:
airmon-ng start wlan0
Jalankan Reaver, tentukan BSSID dari targat AP dan nama dari monitor mode interface (biasanya 'mon0', bukan 'wlan0'):
reaver -i mon0 -b 00:01:02:03:04:05
Coba juga -vv agar lebih banyak informasi yang dikeluarkan
# reaver -i mon0 -b 00:01:02:03:04:05 -vv
Mempercepat serangan
Secara default, Reaver ada 1 second delay antara pin attempts. Kita dapat men-disable dengan menambahkan '-d 0' tapi beberapa AP mungkin tidak akan suka ini:
reaver -i mon0 -b 00:01:02:03:04:05 -vv -d 0
Pilihan lain untuk bisa mempercepat serangan dengan --dh-small. Pilihan ini memerintahkan Reaver untuk menggunakan angka diffie-hellman secret yang kecil untuk mengecilkan beban komputasi di target AP:
reaver -i mon0 -b 00:01:02:03:04:05 -vv --dh-small
MAC Spoofing
In some cases you may want/need to spoof your MAC address. Reaver supports MAC spoofing with the --mac option, but you must ensure that you have spoofed your MAC correctly in order for it to work.
Changing the MAC address of the virtual monitor mode interface (typically named mon0) WILL NOT WORK. You must change the MAC address of your wireless card's physical interface. For example:
# ifconfig wlan0 down # ifconfig wlan0 hw ether 00:BA:AD:BE:EF:69 # ifconfig wlan0 up # airmon-ng start wlan0 # reaver -i mon0 -b 00:01:02:03:04:05 -vv --mac=00:BA:AD:BE:EF:69
Default Pins
It has been reported that some models/vendors/ISPs all come configured with a default pin. Common pins are 12345670, 00005678, 01230000, etc. Reaver attempts known default pins first. Errors and Warnings
It is not uncommon to get a few errors or warnings during the attack, usually related to receive timeouts or out of order WPS messages. You may even get these warnings for a few minutes until the pin count starts incrementing again.
However, if your pin count does not increment at all, or increments only occasionally with lots of errors/warnings, answer the following:
- Does the target AP support WPS and is WPS enabled?
- Did you put your wireless card into monitor mode?
- Did you specify the monitor mode interface with the -i option?
- Do you have a good signal from the AP?
If you still have problems, you can see if your problem is already listed in the project issue tracker. If not, create a new issue, and be sure to include:
- Linux distro, distro version, and architecture (32 bit or 64bit?)
- Wireless card and driver
- Pcap file demonstrating the issue, if possible