Jump to content

Please Disable AbBlock plugin

HaxZone Forum


  • Content Count

  • Joined

  • Last visited

  • Days Won


CyberTech last won the day on June 10 2016

CyberTech had the most liked content!

Community Reputation

1 Neutral

About CyberTech

  • Rank

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. basic music player for android with source code. this is open source project and you can continue improving app. what you need : android studio 3 and Java SDK. Download soruce code here :
  2. This is offical ROM for Teclast Tbook11 Tablet especialy for Device ID : E5A6
  3. Version


  4. Here are the steps to perform a Pixie Dust attack to crack a WiFi password that has WPS enabled. Please note, this attack is very specific in nature. I've had a lot of success running this attack against Ralink and RealTek chipsets. And very spotty success against Broadcom chipsets. This might not work against all routers, but is definitely worth trying before using a brute force attack against WPS Let's Begin!!! Step 1 : First you can download Kali Linux 2.0 wich have pre-installed Pixie WPS 1.1 Step 2: Monitor Mode Put your interface into monitor mode using : "ifconfig wlan0 down" (this command will disable your network wifi card) "iwconfig wlan0 mode monitor" (put your wifi card into monitor mode) and then "ifconfig wlan0 up (start your wifi adapter) Now we have enabled monitor mode Step 3 : Find a Target The easiest way to find a target with WPS enabled is to use this command : 'wash -i (monitor-interface)' im my case its wlan0 Gather the BSSID and channel # for the router you want to attack. Make sure you have a strong signal before attempting this attack. Step 4: Launch the Attack Once you have all the information, simply type in the following command: reaver -i {monitor interface} -b {BSSID of router} -c {router channel} -vvv -K 1 -f Finaly after some seconds There's the password! Again, this attack won't work against all routers, but it is definitely more effective than a brute force attack (Pixie Dust: maximum 30 minutes vs Brute Force: minutes to DAYS!) Here you can find list of some vulnerable models GET LIST in PDF
  • Create New...