How to use Reaver and Aircrack Suite to crack WPA WPS WiFi Security

For educational purposes only: The content in this article is for evaluation and testing. You are not advised to test it on someone else as it's illegal in many countries.
This article is going to focus on the use of aircrack-ng and reaver which can be used to crack any WPS enabled WiFi router.

Preparing for Installation (for Ubuntu 14.04+ users)
Onwards Ubuntu 14.04, the two libraries that reaver requires have been upgraded to a newer version. However, reaver hasn't been updated to a newer version which will support those libraries. Therefore, the only solution to run reaver perfectly is to downgrade those libraries. Please make sure that any software that relies on the newer libraries will either not work or won't work correctly. If you don't apply this fix, reaver won't be able to associate with the router and will result in the following error:


Follow the steps below to downgrade the libraries and to get rid of the error:
  • Open Terminal. Enter sudo su followed by yodfur password (after pressing Enter) to grant root privileges to Terminal.
  • We'll now download the libraries. Now execute wget http://linux.cu.ma/main/libp/libpcap0.8-dev_1.4.0-2_amd64.deb http://linux.cu.ma/main/libp/libpcap0.8_1.4.0-2_amd64.deb. Please replace amd64 with i386 if you are running a 32-bit version of Ubuntu.
  • We'll now commence the downgrade process. Finally execute this command dpkg -i libpcap0.8-dev_1.4.0-2_amd64.deb libpcap0.8_1.4.0-2_amd64.deb. Again, replace amd64 with i386 if you downloaded the 32-bit libraries.
  • During the process, you'll be asked to confirm the downgrade process. Act promptly, and press y to confirm the process.

Installing reaver and aircrack-ng
We'll now start the preliminary steps. Both the utilities are in the official Ubuntu repositories. Hence, they can be simply installed by firing up Terminal and issuing the command sudo apt-get install aircrack-ng reaver.


However, if they are not, nothing to worry about. Just follow the steps below:
  • Fire up Terminal and enter sudo su to attain root privileges.
  • We'll now download reaver and aircrack-ng. Just execute, wget http://ftp.us.debian.org/debian/pool/main/r/reaver/reaver_1.4-2_amd64.deb http://ftp.us.debian.org/debian/pool/main/a/aircrack-ng/aircrack-ng_1.2-0~beta3-4_amd64.deb. Don't forget to replace amd64 with i386 depending on the architecture of your Ubuntu installation.
  • Now finally enter dpkg -i reaver_1.4-2_amd64.deb aircrack-ng_1.2-0~beta3-4_amd64.deb. Don't forget amd64 replacement if necessary.
If the installation reported any dependency errors, execute apt-get -f install to finish installation of any unmet dependencies.

Hacking the WiFi password
  • Fire up Terminal and execute sudo su. This will grant root privileges to the Terminal.
  • Firstly, we have to know how Ubuntu identifies our wireless hardware interface. So execute iwconfig. This will list all active wireless interfaces. The interface will be wlan0 where 0 replaces with any real number.
    So if yours reports wlan1 then it is your wireless interface and you will be using it throughout the tutorial.
  • We'll now activate monitor mode on your wireless interface. This will allow us to see all wireless connections around you bundled with some useful information. So execute airmon-ng start wlan0. Make sure to replace wlan0 with your wireless interface. This will enable monitor mode. Carefully see the screen shot. Remember the underlined word in the shot. For me it's mon0. It will be usually the same for you but if it differs, you'll use it throughout the tutorial.
  • Now we'll see all active wireless connections around you. So enter airodump-ng mon0 replacing mon0 with yours. 
We'll stop here. Let us take some time to understand the window.
BSSID: All wireless connections have a unique identifier. Copy the BSSID of the wireless network you are about to hack.
Beacons: They are data packets. Greater the rate of their increase, greater the probability of the accuracy and penetration of pin injections to the wireless router. So make sure you sit close enough to the router.
ENC: The method which has been used to encrypt the password. For our tutorial only WPA/WPA2 methods will work.
Finally make sure the network you are trying to hack into has WPS (Wireless Protected Setup) enabled. We'll now continue with our main tutorial.
  • Finally, we'll start the hacking process. So enter, reaver -i mon0 -b YOUR_BSSID -vv replacing YOUR_BSSID with the BSSID of the network you wish to hack and mon0 with your monitor interface.
All is done! Reaver will now commence sending WPS pins to the router. When a correct one is send, the router will be forced to send the WiFi password which will be shown to you in the main reaver screen. The process can take a couple of hours so be patient! :)
After you're done, you might want to turn off monitor mode. Just execute airmon-ng stop mon0 (replacing mon0 with your monitor interface) to achieve it!

Troubleshooting
Q. I am getting WARNING: Failed to Associate error.
Did you applied the fix in Preparing for Installation section?

Q. I am getting Waiting for Beacon from BSSID error.
Are you siting close enough to the router? Does the router has WPS enabled?

Q. After few pin attempts I'm getting AP Rate Limiting Detected error.
This means that the router will block further pin attempts for a specific duration if multiple failed pin transactions have occurred in a row. Disable it in your router's settings to continue the hack.




43 comments:

  1. Hi, reaver stopped working after upgrading to Ubuntu 14.04:
    https://code.google.com/p/reaver-wps/issues/detail?can=2&start=0&num=100&q=&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary&groupby=&sort=-id&id=630

    How to fix it? Thanks.

    ReplyDelete
    Replies
    1. This article was tested on Ubuntu 14.04. I don't know why you experienced this problem. Well, you can try using wlan1 or mon1 tags as you are using an external adapter.

      Delete
    2. Hi. But is this a clean install or was it upgraded from 13.10?
      Thanks for your answer.

      Delete
    3. It was tested on 14.04 Alpha and Beta Builds and finally on the released version. No problems detected. The Bluetooth adapter was my laptop's internal one (Dell 1703 to be precise).

      Delete
    4. How To Use Reaver And Aircrack Suite To Crack Wpa Wps Wifi Security >>>>> Download Now

      >>>>> Download Full

      How To Use Reaver And Aircrack Suite To Crack Wpa Wps Wifi Security >>>>> Download LINK

      >>>>> Download Now

      How To Use Reaver And Aircrack Suite To Crack Wpa Wps Wifi Security >>>>> Download Full

      >>>>> Download LINK pc

      Delete
  2. hello. i used at lubuntu 14.04 and at last phase i use reaver i paste my bssid and i get only [!] WARNING: Failed to associate with ....... (ESSID: (null))

    ReplyDelete
    Replies
    1. I have same problem with all bssid items

      Delete
    2. Dear pascalisernestos!
      Please see my updated post to see the fix!

      Delete
  3. I will be updating this post with the fix for Reaver on Ubuntu 14.04 which results in "Failed to Associate Error".

    ReplyDelete
  4. Im always taking this any idea with this please ?
    WARNING: Detected AP rate limiting, waiting 60 seconds before re-checking
    WARNING: Detected AP rate limiting, waiting 60 seconds before re-checking
    WARNING: Detected AP rate limiting, waiting 60 seconds before re-checking

    ReplyDelete
    Replies
    1. Dear Eray,
      AP Rate Limiting means your router will deny further pin attempts for a specific time if multiple false pins have been submitted. Please disable this option in your router's control panel and then continue.

      Delete
  5. This comment has been removed by the author.

    ReplyDelete

  6. Thanks for the Nice Tut and i had done everything as told above and running ubuntu 14.04 but the reaver shows "Waiting for beacon from BSSID" and is looping between [+] Switching mon1 to channel 1 to [+] Switching mon1 to channel 14. how to fix it ?

    ReplyDelete
    Replies
    1. Have you applied the 14.04 fix in the end of the article...
      This could also mean that the router you are using has advanced level of security that is not supported by reaver.

      Delete
  7. I got associated with the wifi but then the checking of pins do not start at all. HELP!!

    ReplyDelete
    Replies
    1. 1. Make sure your are testing it on a router with WPS enabled.
      2. Most modern routers will not work as they have advanced level of security.

      Delete
  8. Hi, the two libraries in the fix for 14.04 don't appear to exist anymore. Is there another library I can use to achieve the same result?

    ReplyDelete
    Replies
    1. same with me, awesome tutorial, best on the web so far

      Delete
    2. I have updated the links; was having papers so was unable to attend to queries.

      Delete
  9. This comment has been removed by the author.

    ReplyDelete
  10. Quick question.. After I'm doing using this, how do I get out of monitoring mode on my Wlan.
    I can't connect to the internet unless I reboot my laptop now.

    ReplyDelete
    Replies
    1. Open Terminal and execute 'airmon-ng stop mon0' (please replace mon0 with your monitor interface and remove quotations).

      Delete
  11. When I type Airodump-ng mon0 it says:
    Airodump-ng: error while loading shared libraries: libgcrypt.so.20: cannot open shared object file: No such file or directory. Need Hell! THX for any useful comment :)

    ReplyDelete
    Replies
    1. Try installing libgcrypt20. Download the deb files from the link below and install them.
      https://packages.debian.org/jessie/libgcrypt20
      https://packages.debian.org/jessie/libgcrypt20-dbg
      https://packages.debian.org/jessie/libgcrypt20-dev
      (Scroll down to bottom to see download links. Download according to your architecture.)

      Delete
    2. I downloaded all 3 of these files on Ubuntu and moved them to Home instead of Downloads. I gave the command: dpkg -i (First File).deb (Second).deb (Third).deb and it says to all three Files:

      dpkg: error processing archive (3 Files).deb
      Cannot Access archive: No such file or directory

      Delete
  12. This comment has been removed by the author.

    ReplyDelete
  13. Ok Now I solved my Problem... But when I type In the last comand and it says 25 Times:
    (+) Sending EAPOL START request
    (!) WARNING: Receive timeout occurred
    Then:
    (+) SENDING WSC NACK
    (!) WPS transaction failed (code: 0x02), re-trying last pin
    (+) Trying Pin 12345670

    And Then Then same with EAPOL 25 times

    ReplyDelete
    Replies
    1. That's not an error on your part. There can be three possibilities,
      1. Either the router you are trying to hack has WPS disabled. (WPS transactions failing)
      2. Your wireless card is injecting poor packets to the router.
      3. The router you're trying to hack has all loopholes that allowed this exploit to work closed.

      Delete
  14. running a fresh install of 14.04 64bit. Ran your commands today 9/21 and receiving the cannot associate error

    ReplyDelete
    Replies
    1. 1. Make sure the router has WPS enabled.
      Also, this guide is now pretty old stuff. New routers have advanced encryption techniques and can't be hacked as of today.

      Delete
  15. Connecting to channel 1
    Connecting to channel 2
    .
    .
    .
    Connecting to channel 14
    continuously
    Any solution about that?

    ReplyDelete
  16. where is routers control panel in ubuntu 14.04
    & how to disable it .

    ReplyDelete
  17. This goes on repeatedly(after 99.99% completed), What should i do to fix it? Thanks

    Trying pin 20799984
    [+] Sending EAPOL START request
    [+] Received identity request
    [+] Sending identity response
    [+] Received M1 message
    [+] Sending M2 message
    [+] Received M3 message
    [+] Sending M4 message
    [+] Received M5 message
    [+] Sending M6 message
    [+] Received WSC NACK
    [+] Sending WSC NACK
    [+] 99.99% complete @ 2015-12-07 07:58:26 (3 seconds/pin)
    [+] Trying pin 20799984

    ReplyDelete
    Replies
    1. Worked fine after I added --pin xxxx
      Thanks for the tutorial

      Delete
  18. Ya i try this process for four hour but each time it is showing:
    .
    .
    .
    [+]Trying pin 12345670

    ReplyDelete
  19. This comment has been removed by the author.

    ReplyDelete
  20. i am getting problem in downgrading...
    root@spidy-PC:/home/parth# wget http://linux.cu.ma/main/libp/libpcap0.8-dev_1.4.0-2_i386.deb http://linux.cu.ma/main/libp/libpcap0.8_1.4.0-2_i386.deb
    --2016-04-17 18:35:03-- http://linux.cu.ma/main/libp/libpcap0.8-dev_1.4.0-2_i386.deb
    Resolving linux.cu.ma (linux.cu.ma)... 66.45.245.150
    Connecting to linux.cu.ma (linux.cu.ma)|66.45.245.150|:80... connected.
    HTTP request sent, awaiting response... 404 Not Found
    2016-04-17 18:35:05 ERROR 404: Not Found.

    --2016-04-17 18:35:05-- http://linux.cu.ma/main/libp/libpcap0.8_1.4.0-2_i386.deb
    Reusing existing connection to linux.cu.ma:80.
    HTTP request sent, awaiting response... 404 Not Found
    2016-04-17 18:35:06 ERROR 404: Not Found.

    ReplyDelete
  21. Me too! Please update the library links again

    ReplyDelete
  22. Me too! Please update the library links again

    ReplyDelete
  23. Switching mon0 to chanel 1 to 14 continuously.
    How to fix this?

    ReplyDelete
  24. when i try download: wget http://linux.cu.ma/main/libp/libpcap0.8-dev_1.4.0-2_amd64.deb , Resolving linux.cu.ma (linux.cu.ma)... failed: Name or service not known.
    wget: unable to resolve host address ‘linux.cu.ma’ pops up. How do i fix this?

    ReplyDelete
  25. How To Use Reaver And Aircrack Suite To Crack Wpa Wps Wifi Security >>>>> Download Now

    >>>>> Download Full

    How To Use Reaver And Aircrack Suite To Crack Wpa Wps Wifi Security >>>>> Download LINK

    >>>>> Download Now

    How To Use Reaver And Aircrack Suite To Crack Wpa Wps Wifi Security >>>>> Download Full

    >>>>> Download LINK

    ReplyDelete