Friday, April 1, 2016

Hack WIFI Password Using Android Phone:

         Hack WIFI Password Using Android Phone:

Step 1 :- Root your android device.
Yes, you must need rooted android device to hack wps pin and I think its not a difficult task right. These days you can root your android device even with simple apps such as "kingo android root" etc.

P.S you can check whether your phone is rooted or not with "root checker basic" android app.


Step 2 :- Device supportability.
Your android device must contain broadcom bcm4329 or bcm4330 chipset. You can check you mobile phone specification for this on internet. Some of the supportable devices are,
  • Nexus one
  • Samsung S series
  • Desire HD
Step 3 :- Download and install bcmon app from code google page.
This tool enables and start monitoring broadcom chipset for your mobile phone.

P.S allow installation for unknown sources from the security menu of your phone while installing the app. 
Step 4 :- Run bcmon app.
After successful installation, run the app. 
Step 5 :- Enable Monitor Mode Option
"Install firmware and tools", if this is promoted simply click on install and after that enable monitor mode option.

Step 6 :- Download and install Reaver app.
Reaver is developed to crack wps pin in order to get wpa2 password. You can download this app form xda-developers site.
Step 7 :- Launch Reaver.
Click on the reaver app icon and run it. Now click on "confirm" button when this message prompts :- "you are not using it for illegal purposes".
Now reaver will scan all your nearby available access points. Now click on the access points form the list you wanted to crack to continue.

Note :- The access point you select must accept wps authentication.

Step 8 :- Verify your settings.
Make sure you have checked "Automatic advanced settings". In most cases default settings will work.
Step 9 :- Click on "start attack" button.
Now lets start the cracking process. Simply click on start attack button from the bottom of the reaver app. Now the monitor will open and you will see the ongoing hacking processes. 

No comments:

Post a Comment