# Cracking WPS PIN :alien:
<!-- Put the link to this slide here so people can follow -->
:beer: *Special Mention : https://github.com/v1s1t0r1sh3r3/airgeddon*
:warning: *Disclaimer This Article just for* **Education Purpose Only**
---
## Tools Requirement ?
- Wireless Card (Support **Managed** & **Monitoring**) :desktop_computer:
- Airgeddon :alien:
- A Cup of Coffee. :coffee:
---
### Here The Topology Work Looks like :dart:
---

Wireless can be connected using **2 Methods**, using a **Password** and activating the **WPS PIN** as another way to connect.
---

---
## First Step - Preparing :footprints:
- You should download the tools, **Airgeddon** from Github
You can download the zip, or using this command
<style>
code.blue {
color: #337AB7 !important;
}
code.orange {
color: #F7A004 !important;
}
code.red {
color: #FF0000 !important;
}
</style>
- <code class="orange">wget https://github.com/v1s1t0r1sh3r3/airgeddon.git</code>: Using *wget* on your terminal
- <code class="blue">[Download the zip file](https://github.com/v1s1t0r1sh3r3/airgeddon)</code>: or you can download the zip files
After the download is done, you should extract the folder, and you will found <code class="blue">./airgeddon.sh</code>
:notebook: Remember, this tools maybe need some **Essential & Optional Tools** so it can run smoothly
## Second Step - Lets Rock ! :rocket:
- Before running the programs, make sure your Your WLAN has been installed on your laptop
- And your user permission is as <code class="orange">Root</code>
- To execute the program, type this command <code class="blue">./airgeddon.sh</code>

- Next the programs will show this message.

There is a message about root permission and your device and operating systems that support running this program. you can press any key to continue.
- Select the WLAN Card

The message on display maybe diffrent, according your wlan card vendor.
- Make sure your wlan card is turn to <code class="blue">Monitor mode</code> by default is <code class="red">Manage Mode</code>

so you should choice **Number 2** form the menu.
- Because in this lesson, we will try to do a pentest on the WPS PIN, so choose **Number 8**.

Select <code class="red">WPS attacks menu</code> and press enter to continue.
- Next step is, find and explore the <code class="red">Target SSID</code> :eight_pointed_black_star:

For explore the network target, you can choice **Number 4 Menu**
After that, a pop up monitoring window that captures wireless networks around you will appear.
To close the monitoring window press <code class="blue">CTRL + C</code>

- And you will back to **Selection Menu**, and choice the <code class="red">Target</code>

- After choice the target, this display will appear and select the <code class="orange">Algorithm</code> to attack the <code class="red">target</code>.

Next, a confirmation of the location of the files resulting from cracking will appear.

> :warning: Make sure you remember, the directory file has been placed.
After entering, the <code class="red">penetration</code> process will begin, and the process depends on the signal and algorithm chosen.
---
## The Result - Goals ! :tada:
> And herethe following are the results of the WPS PINwps pin Ccracking process
We get a lot of stuff :fire:
- **WPS PIN** :lock:
- **WPS Pre-Shared Key** :key:

---
# Conclusion
### End Of Chapter :triangular_flag_on_post:
- **WPS PIN** offers convenience for us **Wi-Fi users**. Especially if it's private Wi-Fi without having to enter a password you can easily <code class="blue">connect</code>.
- However, on the other hand, there is a gap which can become a <code class="red">Problem</code>.
- Because, our <code class="orange">Password</code> can <code class="red">Cracking </code> by WPS PIN <code class="red">Vulenability</code>.
---
### Thank you! :wolfsheep:
You can find me on
- GitHub [B3R4XI](https://github.com/B3R4Xi)
- Linkedin [:small_airplane: ](https://www.linkedin.com/in/nasif-z-nadif/)
- or email me nasifznadif@gmail.com